Computer Security News
Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.
Weidlinger Hosts Hackathon to Inspire Innovation, Team Building
Focus on improving, developing new technical products and improving the efficiency of current practices - March 13, 2015 - Weidlinger Associates, Inc.
For the First Time in the World Stealthphone Information Security System
Mobile Trust Telecommunications company has developed Stealthphone, the first mobile phone and PC security system in the world. Stealthphone guarantees strong encryption of: Voice and data transmitted over Stealthphone IP-servers; Voice transmitted over existing communication systems: GSM, landline, satellite, IP-telephony; Data stored on PC and mobile phone. Encrypted information can be transferred in an encrypted mode via all mail services or in the social media. - March 12, 2015 - Mobile Trust Telecommunications
IEEE ComSoc Announces Spring 2015 Communications Training Schedule
New Program Promotes Real-world Expertise in Wireless, VoLTE & RCS, LTE-Advanced, M2M, Satellite, Software-Defined Networking & Broadband Mobile Satellite Communications - March 12, 2015 - IEEE Communications Society
PrivacyDuck.com Donates 30% of February, March Profits to San Francisco Mission District Fire Victims
PrivacyDuck.com is donating 30% of their February and March 2015 profits to the displaced victims of San Francisco’s January 29th Mission District fire, which left one person dead and numerous long-term residents homeless. PrivacyDuck.com - a San Francisco startup focusing on cost-effective... - March 07, 2015 - PrivacyDuck.com
DMI Enhances MYAndroid Protection App to Prevent User Data Theft and Hacked Cell Accounts Such as Snapchat and Dropbox
End-to-End Enterprise Mobility Solutions Provider Selected for Its Backend and Integration Services and Its Award-Winning User Experience Design Capabilities - March 06, 2015 - Digital Management, LLC
Cybersecurity Experts Address Data Challenges at NJIT on March 30, 2015
NJBIA President Michele N. Siekerka, Esq. will moderate a panel focusing on business concerns targeted especially at company leaders responsible for security policy. - March 05, 2015 - Marriah Media, LLC
"See Inside the Mind of a Hacker" Seminar Set for March 26, 2015
Internet Security Seminar for Business Owners, CIOs & IT Directors Set for March 26, 2015 in Lakewood Ranch, Florida - March 05, 2015 - MapleTronics Computers
PandaLabs Neutralized 75 Million New Malware Samples in 2014, Twice as Many as in 2013
34% of all malware ever created was released in 2014, an average of 200,000 new malware strains per day. The global infection rate in 2014 was 30.42% - UK infection rate of 22.14%. - March 04, 2015 - Panda Security
Adcap Network Systems, Inc. Named to Managed Service Provider 500 List by CRN
Adcap Network Systems, Inc., Passionate, Professional, Proven, today announced it has earned recognition on The Channel Company’s 2015 CRN Managed Service Provider (MSP) 500 list as one of the MSP Elite 150. This annual list distinguishes the top technology providers and consultants in North... - March 03, 2015 - Adcap
Tachyon Delivers Zero Touch Mobile Device Configuration and Deployment with Samsung Bulk Enrollment Program
Kaprica Security Inc., experts in mobility and security, announced the release of the latest version of Tachyon™, their mobile device configuration and deployment solution. This new release includes support for Samsung’s new Bulk Enrollment Program (BEP). Kaprica is demonstrating... - March 02, 2015 - Kaprica Security Inc.
Versatile Security Releases vSEC:CMS K2.0
Versatile Security announces the release of vSEC:CMS K-Series version 2.0. Their most popular smart card tool ever - just got even better. - March 02, 2015 - Versasec AB
Omlis Warns Mobile Payments Security Used by Most Financial Institutions is Subpar
According to mobile payments security experts Omlis, financial institutions in Western Europe are taking huge risks by employing poor methods and relying on outdated banking infrastructures to secure sensitive consumer information for mobile transactions. Omlis argues that financial institutions... - February 27, 2015 - Omlis
Introducing Karsof Systems LLCTM Real-Time Transaction Authentication System Using Biometric Technology
Attention banks and other financial institutions! Introducing Karsof Systems LLC (TM) Real-time Transaction Authentication System using Biometric Technology. How would you like to totally protect your bank/institution and all your customers from fraudulent remote transactions? - February 25, 2015 - Karsof Systems LLC of Houston, TX and California
Osterman Research Finds Most Organizations at Significant Risk from Use of Consumer File Sync and Share Tools
Most organizations allow the use of consumer file sync and share tools, putting them at significant risk of data loss. - February 24, 2015 - Osterman Research, Inc.
LifeSpan Receives OSHA SHARP Award in Denver
Second Location to Receive this Health & Safety Recognition - February 24, 2015 - LifeSpan
Hostirian Now Offering SSAE 16 Compliant Hosting
Hostirian, a St. Louis Hosting and Managed Services company is now offering SSAE 16 compliant hosting and colocation services. The SSAE 16 compliance audit reviewed and tested in-depth controls over the information technology and security used by Hostirian to deliver hosting products to their... - February 23, 2015 - Hostirian Business IT Solutions
Cyber Security Web Site Dedicated to C-Suite and Business Personnel Launches
TheCyberSecurityPlace.Com announces the availability of a web site dedicated to disseminating important cyber security issues facing C-Suite and Business personnel. - February 22, 2015 - The Cyber Security Place
The Average Face of a Hacker is Revealed by the Team at Secure Thoughts
The cybersecurity website Secure Thoughts created an animated GIF that morphs 50 of the most notorious hackers in the world into one person. - February 18, 2015 - Secure Thoughts
Karsof Systems' of Houston, TX Biometric Technology Works with Identification and Private Companies to Serve as the Future of Exact Identification
Businesses need an accurate identification system. Karsof Systems of Houston, TX and California now offers the highest level of individual biometric identification available with their patented biometric security solutions. - February 13, 2015 - Karsof Systems LLC of Houston, TX and California
Information Security Media Group Announces Second Diamond Media Sponsorship with the RSA Conference
Information Security Media Group (ISMG) announces it has been selected as the only Diamond Media Sponsor of RSA Conference 2015. This is the ninth year that ISMG has sponsored the RSA Conference, and its second as Diamond Media Sponsor. This partnership at the conference highlights the level of interest and response the ISMG audience has for the event. - February 12, 2015 - Information Security Media Group
Brian Edelman Spoke on CyberSecurity
Brian Edelman spoke on Cybersecurity at a Conference Sponsored by TD Institutional - February 11, 2015 - Financial Computer
IEEE GLOBECOM 2015 to Hold 58th Annual Conference from December 6 – 10 in San Diego, California
“Call for Papers” Ends April 1 for Original Submissions Dedicated to Innovations & Breakthroughs in Next Generation Communications Technologies - February 05, 2015 - IEEE Communications Society
Four New Services Guarantee Reliability and Maximize Efficiency for Contact Center Management
Four new services are available from M&C - focused to increase efficiency, reliability, and further automate contact centers and IVR platforms, while ensuring optimum productivity. Never before has there been such offerings all at once for services designed specifically around allowing Contact Center management to make greater use of their existing Contact Center and IVR platforms. - February 04, 2015 - M&C Associates LLC
Panda Security Announces New Growth Strategy and Identity Change #PandaSimplexity
The company’s internal and external transformation process has resulted in the birth of a new Panda based on the concept of “simplexity.” Panda’s rebranding initiative signals the beginning of an ambitious five-year growth plan. - February 01, 2015 - Panda Security
ZeroFOX Acquires Vulnr
ZeroFOX accelerates growth through the acquisition of stealth-mode security company Vulnr ZeroFOX, The Social Risk Management Company, announced today its acquisition of Vulnr, a stealth-mode security technology company. The company also announced that Vulnr’s founder, Mike Price, has joined... - January 30, 2015 - ZeroFOX
Kaprica Releases Tachyon App for Automatic Samsung Device Configuration and Deployment
Kaprica Security™ Inc., a thought leader in enterprise cyber security, mobility and cloud software, today released its Tachyon™ v1.0 configuration and deployment software for Samsung mobile devices. - January 29, 2015 - Kaprica Security Inc.
Secure Islands Opens U.S. Headquarters; Taps Top Software Executive Paul Gabrik as Executive Vice President of Sales
Innovative Information Protection Company Ramps to Meet Global Demand for its Disruptive Approach to Information Protection: Data Immunization - January 24, 2015 - Secure Islands - Data Security Solutions
Hostirian Launches HIPAA Compliant Secured Cold-Row Containment Pods
Hostirian, a St. Louis Hosting and Services company has launched HIPAA Compliant Cold-Row Containment Pods. These pods provide a secured, managed location for customers who must comply with HIPAA and HITECH Act security standards. The pods provide a robust colocation environment maximizing your... - January 20, 2015 - Hostirian Business IT Solutions
IEEE GLOBECOM 2014 Concludes with Thousands of Global Telecom Experts Attending 2,500 Presentations in Austin, Texas
57th Annual Event Highlights Cutting-edge Breakthroughs in Internet of Things (IoT), Cloud Computing, Millimeter Wave MIMO, Vehicular Networks & 5G Communications. - January 19, 2015 - IEEE Communications Society
Mobile Payments and Security Top Priority for 2015, Says Omlis and Orion
Mobile payments security experts Omlis and enterprise security leader Orion SaS offer tips on security, new payment options and taking advantage of mobile in the New Year. - January 16, 2015 - Omlis
SnoopWall Enlists as Data Privacy Day Champion and Commits to Respecting Privacy, Safeguarding Data and Enabling Trust
Today SnoopWall announced that it is now a Champion of Data Privacy Day (DPD). As a DPD Champion, SnoopWall recognizes and supports the principle that organizations, businesses and government all share the responsibility of being conscientious stewards of personal information by respecting privacy,... - January 09, 2015 - SnoopWall
LifeSpan Receives OSHA SHARP Award
Excellent Worker Health and Safety Recognized - December 18, 2014 - LifeSpan
PandaLabs Forecast More Divergent Attacks for 2015, Plus Review of Most Notorious Breaches of 2014
2015 will bring more APTs, Ransomware and attacks directed at POS Terminals, IoT devices and smartphones. Review of the dozen most notorious attacks of 2014 includes some of the most well-known household names (companies & celebrities). - December 18, 2014 - Panda Security
Datarecovery.com, Inc. Recovers Data from Sunken Laptop to Assist in Jack McAtee Missing Persons' Case
Datarecovery.com, a world leader in computer forensics and data recovery, was able to recover potentially important data from an extensively damaged laptop computer owned by Jack McAtee. On September 18th, McAtee crashed his car into Dillon Reservoir in Summit County, Colorado. McAtee is bipolar... - December 12, 2014 - Datarecovery.com, Inc.
Announcing the Fourth Annual Healthcare Information Security Today Survey
Information Security Media Group (ISMG), publisher of HealthcareInfoSecurity, announces its fourth annual Healthcare Information Security Today survey. The survey, sponsored by Caradigm, (ISC)² and ZixCorp, measures progress toward ensuring the privacy and security of healthcare information,... - December 12, 2014 - Information Security Media Group
National Rehabilitation Provider Selects Egress Switch to Secure Confidential Patient Information Shared with External Third Parties
Pace Rehabilitation chooses Egress Switch to protect highly sensitive data shared electronically with healthcare professionals, legal consultants and third party insurers. - December 11, 2014 - Egress Software Technologies Ltd
The Final Version of WinRAR 5.20 is Ready for Download
New feature improvements for Windows User Account Control and further enhancements in usability and compatibility in the new version. - December 05, 2014 - win.rar GmbH
Restoring Data Develops Revolutionary Drobo Recovery Tool
ReStoring Data has developed an advanced professional Drobo recovery tool - the only one of its kind. BeyondRaid Recovery connects Drobo drives directly to a PC, virtualizing the entire Drobo unit in order to recover invaluable data when the system has severely failed and the data is no longer accessible. - December 03, 2014 - ReStoring Data Inc.
2015 Mobility Risk Study Now Open to Respondents
Information Security Media Group (ISMG), publisher of InfoRiskToday, announces that the 2015 Mobility Risk Study, sponsored by Citrix, is now open for respondents. This new study, sponsored by Citrix and open across ISMG's international media sites, looks to measure the true security of... - December 03, 2014 - Information Security Media Group
Panda Updates Cloud Security with Content Filtering for Exchange and Device Control Improvements
Panda Cloud Office Protection (PCOP) 7.1 offers greater blocking and control capabilities for large and medium-sized companies. This version provides greater granularity of the device control technology, adding the ability to whitelist devices, block mobile devices and make exclusions. Updated endpoint console to manage protection directly when using the device. - November 29, 2014 - Panda Security
Computer Security Day 2014 Calls for Mobile Payment Security and Tokenization
In light of Computer Security Day on 30 November, mobile payment security experts Omlis and cyber-security company Orion Software and Services claim that mobile payment encryption requires tokenization and strong security for mobile devices. - November 28, 2014 - Omlis
FoxGuard Launches Next Generation Industrial HMI
FoxGuard Solutions released its 3U Industrial HMI, a rackmount computer designed to provide flexibility and reliability. This rackmount system is developed specifically for industrial applications in the energy and factory automation markets, as well as other critical infrastructure... - November 25, 2014 - FoxGuard Solutions
Big Iron Solutions, Iron-Secure Managed Security & PCI Compliance for Mainframes
Big Iron Solutions announces managed security services for organizations with mainframe computer systems that require compliance with PCI Data Security Standards (PCI-DSS). - November 23, 2014 - Big Iron Solutions Inc.
NTI Announces Winners of Backup Now EZ Sweepstakes
Four luck winners will each get a free Toshiba wireless SSD. Check to see if you are a winner. - November 15, 2014 - NTI Corporation
ISMG Launches Executive Sessions Interview Series
Information Security Media Group (ISMG), publisher of InfoRiskToday, BankInfoSecurity, HealthcareInfoSecurity and numerous other global media sites, is pleased to announce the launch of its Executive Sessions interview series. The Executive Sessions series features exclusive, one-on-one... - November 15, 2014 - Information Security Media Group
Free Cryptic Disk 4 Replaces TrueCrypt
Exlade releases Cryptic Disk 4, a new version of its disk encryption program. In the update, the software implements compatibility with abandoned TrueCrypt and goes free with a special Cryptic Disk Free license. A number of functional changes are announced as well. Users working with certain... - November 15, 2014 - Exlade
Attorney Brent M. Buckley to Moderate "Cybersecurity: Investigation - Prosecution - Prevention"
Brent M. Buckley, Managing Partner of the law firm of Buckley King and Chair of the Cleveland Metropolitan Bar Association's Business Banking & Corporate Counsel Section to moderate "Cybersecurity: Investigation - Prosecution - Prevention." - November 13, 2014 - Buckley King
Amaryllo Receives 2015 CES Best of Innovation Award
iCamPro FHD, a Google WebRTC home security network camera, is selected as a 2015 CES Best of Innovation winner in the Embedded Technologies product category. - November 11, 2014 - Amaryllo Inc.
AT&T, National Instruments, Huawei & Cisco to Headline Dais of International Speakers at IEEE GLOBECOM 2014 to be held December 8 – 12 in Austin, Texas
Senior Representatives of the World’s Leading Communications Corporations to Convene at Premier Global Event to Explore the Latest Advancements in Global Telecommunications - November 07, 2014 - IEEE Communications Society
Real Time Logic SharkSSL Delivers Real-Time Device Security
Researchers credit SharkSSL as the fastest, smallest SSL TLS for microcontroller-driven applications. - November 07, 2014 - Real Time Logic