Technology Pathways releases ProDiscover version 4.8
Technology Pathways announced today that it has begun shipping ProDiscover version 4.8 with several groundbreaking features including BIOS imaging capability, support for …
SELinux gets easier with a new beta version of Tresys Brickwall enterprise client
Tresys Technology, a primary contributor to Security Enhanced Linux (SELinux), today released a beta version of its Tresys Brickwall Enterprise Client for Red Hat Enterprise …
Olympic torch hoax burns a hole in productivity, again
The Olympic Torch Virus Hoax is back in circulation in a big way. This time it’s seen doing rounds predominantly among Orkut Online Community members, informs Security …
New trick adopted by spammers to harvest email addresses
IT security firm Sophos has warned computer users to think before forwarding chain letters after discovering a new scam being used by spammers to collect email addresses. A …
VIP Defense announces VIP Privacy
VIP Defense announces today the release of VIP Privacy, an ultimate program for user’s privacy protection. In the age of ever-growing alert for cyber-frauds, the …
Panda Software launches 2007 range of products
Panda Antivirus 2007 is the lightest antivirus in the Panda Software consumer solutions range. This new, easy-to-use, antivirus solution offers complete protection against …
Wave to support Trusted Computing Group’s Security Specifications for Mobile Phones
Wave Systems Corp. announced plans to extend its EMBASSY Trust Suite software in support of the newly published TCG security specifications for mobile phones. The announcement …
Arxceo awarded U.S. Patent for Anti-Reconnaissance and Anti-Address Spoofing technology
Arxceo Corporation has been awarded a crucial U.S. patent covering its core technology and approach to improving network security with its Plug and Protect (PnPRO) and …
Registration opens for updated CompTIA A+ Certification
The Computing Technology Industry Association (CompTIA), the world’s largest provider of vendor neutral certifications for professionals in the information technology …
Trusted Computing Group announces Open Specification for Mobile Phone Security
The Trusted Computing Group’s Mobile Phone Work Group, which has been working to create an industry-wide approach to securing data, transactions and content, for mobile …
Experts say laptops are the weak link in data security
New research has found that the frequency of laptop theft in the workplace is high. The findings mirrored those from last year, which indicated a similar lack of security …
Considered outsourcing the role of Chief Information Security Officer?
Organizations are barraged with overlapping regulatory compliance requirements and security vulnerabilities. For many small-to-midsize businesses a full-time Chief Information …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface