Computer Security News

Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.

World’s First Non-OTP 2-Factor Authentication Chrome App Finally Arrives

In a cybersecurity breakthrough, Cyphercor Inc. releases the first ever non-OTP (one-time password) based two-factor authentication app for desktops and laptops via Google Chrome. - April 09, 2015 - Cyphercor Inc.

For the First Time for WordPress Users, Checking Existing Comments for Spam

For the First Time for WordPress Users, Checking Existing Comments for Spam

CleanTalk offers more protection from spam bots to sites by WordPress. The new version provides a unique opportunity to test existing spam comments. - April 08, 2015 - CleanTalk Inc

ITC Digital Announced as StratoKey UK Partner

Due to increased demand for cloud encryption and web app security in the UK, StratoKey adds ITC Digital as value-added reseller to promote and support StratoKey in the region. - April 04, 2015 - StratoKey

Cisco Industry Leader Matthew Merriman Joins Adcap, Cisco Gold Partner & Solution Integrator, as Chief Operating Officer

Cisco Industry Leader Matthew Merriman Joins Adcap, Cisco Gold Partner & Solution Integrator, as Chief Operating Officer

Adcap Network Systems, one of the top Cisco Gold Partners in the country, is excited to announce the addition of Matthew Merriman as their new Chief Operating Officer. Mr. Merriman brings over 25 years of operational experience in the Cisco partner community, including previous Vice Presidential roles at Prosys, Presidio and Solarcom. - March 25, 2015 - Adcap

M&C Associates Provides Security Audit Services to Investigate Vulnerabilities

M&C Associates Provides Security Audit Services to Investigate Vulnerabilities

Preventative measures ensure data and business is not compromised. M&C is now offering Security Audit Services to help its customers take preventative measures to ensure that business-critical and confidential data is not compromised. This service is available to anyone with an installed Avaya MPS IVR, Avaya Experience Portal – AAEP, or Avaya Contact Center – AACC. - March 25, 2015 - M&C Associates LLC

IEEE ICC 2015 Explores “Smart City & Smart World” Innovations from June 8 – 12 in London’s Tech City

The 2015 IEEE International Conference on Communications (www.ieee-icc.org/2015), the premier international venue dedicated to the worldwide advancement of wireless and wireline communications, will host its next annual event from 8-12 June 2015 at the ExCel London convention centre in London, UK. - March 24, 2015 - IEEE Communications Society

New Live or On-Demand Online Courses Develop Human Resources and Technology Skills for Leaders in Business of Law

New Live or On-Demand Online Courses Develop Human Resources and Technology Skills for Leaders in Business of Law

The business of law is changing every day, and the Association of Legal Administrators' (ALA) eLearning Center is designed to meet the needs of industry leaders in a flexible format to fit busy schedules. Online courses can be completed either live – with peer collaboration and networking opportunities – or on-demand, at the learner’s convenience. ALA has opened enrollment for two new eLearning courses focusing on the Human Resources and Operations Management/IT subject areas. - March 24, 2015 - Association of Legal Administrators (ALA)

Eastern DataComm Introduces “CLASS” Comprehensive Lockdown Alert and Safety Solution

Eastern DataComm recently unveiled a comprehensive solution that fully automates the notification procedures a school district needs in the event of a lockdown event – whether just a drill or the real thing. “As we continue to collaborate with schools throughout New Jersey and New... - March 17, 2015 - Eastern DataComm

Weidlinger Hosts Hackathon to Inspire Innovation, Team Building

Focus on improving, developing new technical products and improving the efficiency of current practices - March 13, 2015 - Weidlinger Associates, Inc.

For the First Time in the World Stealthphone Information Security System

For the First Time in the World Stealthphone Information Security System

Mobile Trust Telecommunications company has developed Stealthphone, the first mobile phone and PC security system in the world. Stealthphone guarantees strong encryption of: Voice and data transmitted over Stealthphone IP-servers; Voice transmitted over existing communication systems: GSM, landline, satellite, IP-telephony; Data stored on PC and mobile phone. Encrypted information can be transferred in an encrypted mode via all mail services or in the social media. - March 12, 2015 - Mobile Trust Telecommunications

IEEE ComSoc Announces Spring 2015 Communications Training Schedule

New Program Promotes Real-world Expertise in Wireless, VoLTE & RCS, LTE-Advanced, M2M, Satellite, Software-Defined Networking & Broadband Mobile Satellite Communications - March 12, 2015 - IEEE Communications Society

PrivacyDuck.com Donates 30% of February, March Profits to San Francisco Mission District Fire Victims

PrivacyDuck.com is donating 30% of their February and March 2015 profits to the displaced victims of San Francisco’s January 29th Mission District fire, which left one person dead and numerous long-term residents homeless. PrivacyDuck.com - a San Francisco startup focusing on cost-effective... - March 07, 2015 - PrivacyDuck.com

DMI Enhances MYAndroid Protection App to Prevent User Data Theft and Hacked Cell Accounts Such as Snapchat and Dropbox

End-to-End Enterprise Mobility Solutions Provider Selected for Its Backend and Integration Services and Its Award-Winning User Experience Design Capabilities - March 06, 2015 - Digital Management, LLC

Cybersecurity Experts Address Data Challenges at NJIT on March 30, 2015

Cybersecurity Experts Address Data Challenges at NJIT on March 30, 2015

NJBIA President Michele N. Siekerka, Esq. will moderate a panel focusing on business concerns targeted especially at company leaders responsible for security policy. - March 05, 2015 - Marriah Media, LLC

"See Inside the Mind of a Hacker" Seminar Set for March 26, 2015

Internet Security Seminar for Business Owners, CIOs & IT Directors Set for March 26, 2015 in Lakewood Ranch, Florida - March 05, 2015 - MapleTronics Computers

PandaLabs Neutralized 75 Million New Malware Samples in 2014, Twice as Many as in 2013

34% of all malware ever created was released in 2014, an average of 200,000 new malware strains per day. The global infection rate in 2014 was 30.42% - UK infection rate of 22.14%. - March 04, 2015 - Panda Security

Adcap Network Systems, Inc. Named to Managed Service Provider 500 List by CRN

Adcap Network Systems, Inc. Named to Managed Service Provider 500 List by CRN

Adcap Network Systems, Inc., Passionate, Professional, Proven, today announced it has earned recognition on The Channel Company’s 2015 CRN Managed Service Provider (MSP) 500 list as one of the MSP Elite 150. This annual list distinguishes the top technology providers and consultants in North... - March 03, 2015 - Adcap

Tachyon Delivers Zero Touch Mobile Device Configuration and Deployment with Samsung Bulk Enrollment Program

Tachyon Delivers Zero Touch Mobile Device Configuration and Deployment with Samsung Bulk Enrollment Program

Kaprica Security Inc., experts in mobility and security, announced the release of the latest version of Tachyon™, their mobile device configuration and deployment solution. This new release includes support for Samsung’s new Bulk Enrollment Program (BEP). Kaprica is demonstrating... - March 02, 2015 - Kaprica Security Inc.

Versatile Security Releases vSEC:CMS K2.0

Versatile Security announces the release of vSEC:CMS K-Series version 2.0. Their most popular smart card tool ever - just got even better. - March 02, 2015 - Versasec AB

Omlis Warns Mobile Payments Security Used by Most Financial Institutions is Subpar

According to mobile payments security experts Omlis, financial institutions in Western Europe are taking huge risks by employing poor methods and relying on outdated banking infrastructures to secure sensitive consumer information for mobile transactions. Omlis argues that financial institutions... - February 27, 2015 - Omlis

Introducing Karsof Systems LLCTM Real-Time Transaction Authentication System Using Biometric Technology

Introducing Karsof Systems LLCTM Real-Time Transaction Authentication System Using Biometric Technology

Attention banks and other financial institutions! Introducing Karsof Systems LLC (TM) Real-time Transaction Authentication System using Biometric Technology. How would you like to totally protect your bank/institution and all your customers from fraudulent remote transactions? - February 25, 2015 - Karsof Systems LLC of Houston, TX and California

Osterman Research Finds Most Organizations at Significant Risk from Use of Consumer File Sync and Share Tools

Osterman Research Finds Most Organizations at Significant Risk from Use of Consumer File Sync and Share Tools

Most organizations allow the use of consumer file sync and share tools, putting them at significant risk of data loss. - February 24, 2015 - Osterman Research, Inc.

LifeSpan Receives OSHA SHARP Award in Denver

LifeSpan Receives OSHA SHARP Award in Denver

Second Location to Receive this Health & Safety Recognition - February 24, 2015 - LifeSpan

Hostirian Now Offering SSAE 16 Compliant Hosting

Hostirian Now Offering SSAE 16 Compliant Hosting

Hostirian, a St. Louis Hosting and Managed Services company is now offering SSAE 16 compliant hosting and colocation services. The SSAE 16 compliance audit reviewed and tested in-depth controls over the information technology and security used by Hostirian to deliver hosting products to their... - February 23, 2015 - Hostirian Business IT Solutions

Cyber Security Web Site Dedicated to C-Suite and Business Personnel Launches

TheCyberSecurityPlace.Com announces the availability of a web site dedicated to disseminating important cyber security issues facing C-Suite and Business personnel. - February 22, 2015 - The Cyber Security Place

The Average Face of a Hacker is Revealed by the Team at Secure Thoughts

The Average Face of a Hacker is Revealed by the Team at Secure Thoughts

The cybersecurity website Secure Thoughts created an animated GIF that morphs 50 of the most notorious hackers in the world into one person. - February 18, 2015 - Secure Thoughts

Karsof Systems' of Houston, TX Biometric Technology Works with Identification and Private Companies to Serve as the Future of Exact Identification

Karsof Systems' of Houston, TX Biometric Technology Works with Identification and Private Companies to Serve as the Future of Exact Identification

Businesses need an accurate identification system. Karsof Systems of Houston, TX and California now offers the highest level of individual biometric identification available with their patented biometric security solutions. - February 13, 2015 - Karsof Systems LLC of Houston, TX and California

Information Security Media Group Announces Second Diamond Media Sponsorship with the RSA Conference

Information Security Media Group (ISMG) announces it has been selected as the only Diamond Media Sponsor of RSA Conference 2015. This is the ninth year that ISMG has sponsored the RSA Conference, and its second as Diamond Media Sponsor. This partnership at the conference highlights the level of interest and response the ISMG audience has for the event. - February 12, 2015 - Information Security Media Group

Brian Edelman Spoke on CyberSecurity

Brian Edelman spoke on Cybersecurity at a Conference Sponsored by TD Institutional - February 11, 2015 - Financial Computer

IEEE GLOBECOM 2015 to Hold 58th Annual Conference from December 6 – 10 in San Diego, California

“Call for Papers” Ends April 1 for Original Submissions Dedicated to Innovations & Breakthroughs in Next Generation Communications Technologies - February 05, 2015 - IEEE Communications Society

Four New Services Guarantee Reliability and Maximize Efficiency for Contact Center Management

Four New Services Guarantee Reliability and Maximize Efficiency for Contact Center Management

Four new services are available from M&C - focused to increase efficiency, reliability, and further automate contact centers and IVR platforms, while ensuring optimum productivity. Never before has there been such offerings all at once for services designed specifically around allowing Contact Center management to make greater use of their existing Contact Center and IVR platforms. - February 04, 2015 - M&C Associates LLC

Panda Security Announces New Growth Strategy and Identity Change #PandaSimplexity

The company’s internal and external transformation process has resulted in the birth of a new Panda based on the concept of “simplexity.” Panda’s rebranding initiative signals the beginning of an ambitious five-year growth plan. - February 01, 2015 - Panda Security

ZeroFOX Acquires Vulnr

ZeroFOX accelerates growth through the acquisition of stealth-mode security company Vulnr ZeroFOX, The Social Risk Management Company, announced today its acquisition of Vulnr, a stealth-mode security technology company. The company also announced that Vulnr’s founder, Mike Price, has joined... - January 30, 2015 - ZeroFOX

Kaprica Releases Tachyon App for Automatic Samsung Device Configuration and Deployment

Kaprica Releases Tachyon App for Automatic Samsung Device Configuration and Deployment

Kaprica Security™ Inc., a thought leader in enterprise cyber security, mobility and cloud software, today released its Tachyon™ v1.0 configuration and deployment software for Samsung mobile devices. - January 29, 2015 - Kaprica Security Inc.

Secure Islands Opens U.S. Headquarters; Taps Top Software Executive Paul Gabrik as Executive Vice President of Sales

Innovative Information Protection Company Ramps to Meet Global Demand for its Disruptive Approach to Information Protection: Data Immunization - January 24, 2015 - Secure Islands - Data Security Solutions

Hostirian Launches HIPAA Compliant Secured Cold-Row Containment Pods

Hostirian Launches HIPAA Compliant Secured Cold-Row Containment Pods

Hostirian, a St. Louis Hosting and Services company has launched HIPAA Compliant Cold-Row Containment Pods. These pods provide a secured, managed location for customers who must comply with HIPAA and HITECH Act security standards. The pods provide a robust colocation environment maximizing your... - January 20, 2015 - Hostirian Business IT Solutions

IEEE GLOBECOM 2014 Concludes with Thousands of Global Telecom Experts Attending 2,500 Presentations in Austin, Texas

57th Annual Event Highlights Cutting-edge Breakthroughs in Internet of Things (IoT), Cloud Computing, Millimeter Wave MIMO, Vehicular Networks & 5G Communications. - January 19, 2015 - IEEE Communications Society

Mobile Payments and Security Top Priority for 2015, Says Omlis and Orion

Mobile payments security experts Omlis and enterprise security leader Orion SaS offer tips on security, new payment options and taking advantage of mobile in the New Year. - January 16, 2015 - Omlis

SnoopWall Enlists as Data Privacy Day Champion and Commits to Respecting Privacy, Safeguarding Data and Enabling Trust

SnoopWall Enlists as Data Privacy Day Champion and Commits to Respecting Privacy, Safeguarding Data and Enabling Trust

Today SnoopWall announced that it is now a Champion of Data Privacy Day (DPD). As a DPD Champion, SnoopWall recognizes and supports the principle that organizations, businesses and government all share the responsibility of being conscientious stewards of personal information by respecting privacy,... - January 09, 2015 - SnoopWall

LifeSpan Receives OSHA SHARP Award

LifeSpan Receives OSHA SHARP Award

Excellent Worker Health and Safety Recognized - December 18, 2014 - LifeSpan

PandaLabs Forecast More Divergent Attacks for 2015, Plus Review of Most Notorious Breaches of 2014

2015 will bring more APTs, Ransomware and attacks directed at POS Terminals, IoT devices and smartphones. Review of the dozen most notorious attacks of 2014 includes some of the most well-known household names (companies & celebrities). - December 18, 2014 - Panda Security

Datarecovery.com, Inc. Recovers Data from Sunken Laptop to Assist in Jack McAtee Missing Persons' Case

Datarecovery.com, Inc. Recovers Data from Sunken Laptop to Assist in Jack McAtee Missing Persons' Case

Datarecovery.com, a world leader in computer forensics and data recovery, was able to recover potentially important data from an extensively damaged laptop computer owned by Jack McAtee. On September 18th, McAtee crashed his car into Dillon Reservoir in Summit County, Colorado. McAtee is bipolar... - December 12, 2014 - Datarecovery.com, Inc.

Announcing the Fourth Annual Healthcare Information Security Today Survey

Information Security Media Group (ISMG), publisher of HealthcareInfoSecurity, announces its fourth annual Healthcare Information Security Today survey. The survey, sponsored by Caradigm, (ISC)² and ZixCorp, measures progress toward ensuring the privacy and security of healthcare information,... - December 12, 2014 - Information Security Media Group

National Rehabilitation Provider Selects Egress Switch to Secure Confidential Patient Information Shared with External Third Parties

Pace Rehabilitation chooses Egress Switch to protect highly sensitive data shared electronically with healthcare professionals, legal consultants and third party insurers. - December 11, 2014 - Egress Software Technologies Ltd

The Final Version of WinRAR 5.20 is Ready for Download

New feature improvements for Windows User Account Control and further enhancements in usability and compatibility in the new version. - December 05, 2014 - win.rar GmbH

Restoring Data Develops Revolutionary Drobo Recovery Tool

Restoring Data Develops Revolutionary Drobo Recovery Tool

ReStoring Data has developed an advanced professional Drobo recovery tool - the only one of its kind. BeyondRaid Recovery connects Drobo drives directly to a PC, virtualizing the entire Drobo unit in order to recover invaluable data when the system has severely failed and the data is no longer accessible. - December 03, 2014 - ReStoring Data Inc.

2015 Mobility Risk Study Now Open to Respondents

Information Security Media Group (ISMG), publisher of InfoRiskToday, announces that the 2015 Mobility Risk Study, sponsored by Citrix, is now open for respondents. This new study, sponsored by Citrix and open across ISMG's international media sites, looks to measure the true security of... - December 03, 2014 - Information Security Media Group

Panda Updates Cloud Security with Content Filtering for Exchange and Device Control Improvements

Panda Cloud Office Protection (PCOP) 7.1 offers greater blocking and control capabilities for large and medium-sized companies. This version provides greater granularity of the device control technology, adding the ability to whitelist devices, block mobile devices and make exclusions. Updated endpoint console to manage protection directly when using the device. - November 29, 2014 - Panda Security

Computer Security Day 2014 Calls for Mobile Payment Security and Tokenization

In light of Computer Security Day on 30 November, mobile payment security experts Omlis and cyber-security company Orion Software and Services claim that mobile payment encryption requires tokenization and strong security for mobile devices. - November 28, 2014 - Omlis

FoxGuard Launches Next Generation Industrial HMI

FoxGuard Launches Next Generation Industrial HMI

FoxGuard Solutions released its 3U Industrial HMI, a rackmount computer designed to provide flexibility and reliability. This rackmount system is developed specifically for industrial applications in the energy and factory automation markets, as well as other critical infrastructure... - November 25, 2014 - FoxGuard Solutions

Press Releases 1,601 - 1,650 of 3,320