Computer Security News
Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.
EZblue Software Corporation Releases EZblue Linux Server 3.9, Featuring the iTunes Compatible Firefly Streaming Server Module
People that have old PCs hanging around can choose to save it from a landfill by downloading a copy of EZblue Business Server software, to turn the computer into a powerful server in minutes. - April 15, 2009 - EZblue Software Corp.
Quality Track to Celebrate 2 Million Mystery Shop Calls
Quality Track International is proud to celebrate the upcoming milestone of our 2 millionth mystery shop call. Quality Track has been an industry leader since 1996 and is dedicated to conducting telephone mystery shopping and PCI compliant remote call monitoring exclusively for the hospitality... - April 14, 2009 - Quality Track International Inc.
Is RFID Security a Cause for Concern? RFID Security Alliance Members to Discuss at 2009 RFID Journal Live!
Members of the RFID Security Alliance (RFIDSA) are participating in a presentation at the 2009 RFID Journal Live! conference titled “Is RFID Security a Cause for Concern?” The talk will be presented on April 27, 2009 at 2:30 pm as part of the preconference seminar, RFID for IT... - April 13, 2009 - SecureRF Corporation
ITCourseware Partners with Mile2 to Provide Information Security Courseware
ITCourseware, LLC, has entered into an exclusive reseller agreement with Mile2, authorizing ITCourseware to market and sell the highly acclaimed Mile2 Information Security training courseware. - April 11, 2009 - ITCourseware, LLC
World Class Information Security Conference to Host Security Certification and Training Classes
EC-Council is offering world class Information Security training with the launch of Hacker Halted | Academy at the upcoming Hacker Halted USA Information Security Conference a premier information security training event to be hosted in Miami, Florida, on September 20-25, 2009. - April 10, 2009 - Hacker Halted
Aujas Networks Announces New Office Opening in Dubai
Aujas enters Middle-East market; opens regional office in Dubai - April 08, 2009 - Aujas Networks
EZWatch Pro, a National Supplier of Video Surveillance Systems Unveils Its New Government & Schools Purchasing Program
The long awaited video surveillance purchasing program for government, schools and universities was unveiled by EZWatch Pro, a national provider of commercial video surveillance and security camera solutions. The new Government & Schools Purchasing Program (GSPP) sets a new standard for federal, state and local government purchasing. - April 07, 2009 - EZWatch Pro
Hacker Halted USA 2009 Security Sponsorship - Core Security Technologies as Premier Gold Sponsor
Core Security Technologies becomes the Premier Gold Sponsor for the Hacker Halted 2009 information security conference held in Miami, from September 23 - 25, 2009. - April 05, 2009 - Hacker Halted
Web Development Firm Bayshore Solutions Makes Spam Protection Priority for Murphy Business and Financial Services
Web development firm Bayshore Solutions, provided Murphy Business & Financial Corporation reliable, secure protection for their e-mail. In seven hours a total of 2,174 pieces of spam were rejected and did not even get to the mail server. - April 03, 2009 - Bayshore Solutions
Qadit Systems Empanelled by CERT-In as a Qualified IT Security Auditing Organisation
Qadit Systems & Solutions Pvt Ltd has been empanelled by CERT-In as one of the few qualified IT Security Auditing organisations in the country. Indian Computer Emergency Response Team (CERT-In) is a national initiative to tackle emerging challenges in the area of information security and... - March 26, 2009 - Qadit Systems & Solutions Pvt Ltd
The Race for the H-1 Visa Lottery is on… with Options
The deadline for H1b visa applications is imminent....but other options are available to those who choose wisely. - March 18, 2009 - WorldWide-Press.com
Software Piracy Police Target Chicago Businesses Despite Recession
Business Software Alliance (BSA) increases its anti-piracy enforcement efforts in the Chicago area in spite of economic downturn. - March 16, 2009 - Scott & Scott, LLP
Information Security Academy of International Standards to be Launched Globally
World class Information Security Academy- Hacker Halted | Academy will be launched at the upcoming Hacker Halted USA Information Security Conference in Miami. - March 13, 2009 - EC-Council
Security Conference in 2009 – Global Security Experts to Present at Hacker Halted USA
Amidst the global economic crisis, EC-Council is adamant to put up a world class information security conference that will serve the community well. - March 05, 2009 - EC-Council
(ISC)2 Announces New Board Members and Elects 2009 Board Officers
(ISC)2, the not-for-profit global leader in educating and certifying information security professionals throughout their careers, today announced three new members to its Board of Directors as well as its 2009 executive officers. - March 03, 2009 - (ISC)2
Intronis Offers a Lifeline to Former HP Upline Business Users
In the aftermath of the closure of HP Upline on Thursday, February 26, Intronis Technologies (http://intronis.com) extended a hand to Upline’s former business customers, with a 25% Business Lifeline Discount and free 14-day trial. HP Upline is the second brand-name backup solution to fold... - February 28, 2009 - Intronis Technologies
Ciphent Lends Expertise to National Cybersecurity Discussion
CEO, James C. Foster Featured on Federal News Radio to Discuss the Merits and Pitfalls of President Obama’s Cyber Security Initiatives. Peaking concern over the growing frequency and severity of international cyber attacks has driven the White House to push for a nationwide “health... - February 27, 2009 - Ciphent, Inc.
Unmetered Colocation in March 2009 Offered
Dedicated Server and Colocation Store (www.dedicatedserverstore.com) is now offering unmetered colocation as part of their special colocation offers in March 2009. - February 24, 2009 - Stealth - ISS Group Inc.
JMKDomains Cuts I.T. Overhead for Customers
New Assisted Services for Dedicated Servers from JMKDomains Equals Expert Support & Great Value. - February 22, 2009 - JMKDomains
Shira Rubinoff of Green Armor Solutions Named Top Businesswoman: President Honored as One of New Jersey's Best 50 Women in Business
Shira Rubinoff, President of Green Armor Solutions, has been named one of New Jersey’s Best 50 Women in Business by NJBIZ, New Jersey’s premiere business magazine. - February 19, 2009 - Green Armor Solutions
Ciphent Expands National Sales Force
In a move contradictory to the current economic environment, Ciphent, Inc. has expanded their national sales force to include an Ohio Valley, Mid-Atlantic and dedicated Federal team. Ciphent's expansion is fueled by their mission-statement, their dedication to "protect the United States, her allies, corporations and citizens from all varieties of cyber threats and attacks." - February 18, 2009 - Ciphent, Inc.
BalaBit's syslog-ng Open Source Edition 3.0 Brings Native TLS Encryption and SQL Support
The main features of the new release include native TLS and SQL support, support for the new syslog protocol and message-format standard developed by IETF, and the ability to segment and rewrite log messages. - February 18, 2009 - xyz
Sibyl Systems Begin Central New York Operations
Sibyl Systems, a IT solutions provider and subcontracting firm has began operating in the Central New York marketplace. - February 12, 2009 - Sibyl Systems
Proxicast Releases New IPSec VPN Client for Windows
Proxicast, manufacturer of the LAN-Cell family of 3G cellular routers, has teamed with TheGreenBow Security Software to develop the Proxicast IPSec VPN Client software for Windows which offers customers a simple to deploy and easy to use VPN solution for remote access over 3G cellular networks. - February 12, 2009 - TheGreenBow
AEP Networks Signs Value Added Distribution Agreement in Greater China with MobileTech
MobileTech Limited extends the distribution of AEP Networks’ integrated portfolio of security products: AEP Netilla SSL VPN, AEP SmartGate and AEP Keyper, in addition to its existing distribution of AEP Networks’ communications products. - February 11, 2009 - MobileTech Limited
Planet Technologies Names Department of Energy’s Former Deputy Assistant Secretary for National Security as Director of Business Solutions
Planet Technologies, an award-winning technology consulting firm headquartered in Germantown, Maryland, announced today that Christopher “Rocky” Campione joined the company as their Director of Business Solutions. In this role, Campione will be leveraging his vast experience in cyber... - February 10, 2009 - Planet Technologies
Yubico Brings Simple and Strong Authentication to MediaWiki
Yubico adds strong authentication to MediaWiki with YubiKey, a thin USB-key requiring no client software. This allows users to confidently access information in their Wiki communities and avoid the growing problem of spam, bots and misuse. - February 07, 2009 - Yubico
Media5 Introduces the Media5Boss-Branch Suite of Branch Office Secure Survivable Solutions
Media5Boss-Branch delivers secure and survivable real-time communications solutions for the enterprise and service provider marketplace. - February 05, 2009 - Media5 Corporation
Media5 Corporation to Leverage Mediatrix Telecom and M5T to Drive Leading-Edge MMoIP Products, Technologies and Services
The strengths of Mediatrix Telecom and M5T are being combined to offer Service Providers and Enterprises the most complete set of MMoIP products and services. - February 04, 2009 - Media5 Corporation
Presensoft Launches First Real-Time Compliance for IntercontinentalExchange ICE & YellowJacket Chat
Industry IM Security and Compliance Specialist Extends Messaging Compliance to Industry Leading Energy Trading Platform. - February 04, 2009 - Presensoft Inc.
"Obama Worm" No Longer a Mystery
AVG and avast! detect new “Obama Worm” threat discovered this past week. - February 04, 2009 - Walling Data
Presensoft Inc. Named Finalist in 2009 SC Awards Program
Presensoft IM Policy Manager was named in the Best Instant Messaging Security Solution category of the Reader Trust Award competition, which honors best-in-class security products and services. - February 03, 2009 - Presensoft Inc.
Business Survival Linked to Smarter Security
Some companies “sabotage themselves” by not balancing network security and business needs. - February 01, 2009 - Pacific Coast Information Systems Ltd.
Yubico’s Open Source Authentication Key Protects Web Recruiter Candidate Database Against Fraud
Autojobs.nl's principal business assets are safely secured ’in-the-cloud‘ with YubiKey and Oblivion. - January 31, 2009 - Yubico
Savid Technologies Partners with FBI to Provide a Seminar to Enterprises on What Happens After a Hacker Successfully Breaks in
Savid Technologies partners with FBI to provide a seminar to enterprises on what happens after a hacker successfully breaks in because security vendors and consulting firms spend much time talking about preventing cyber attacks, but not as much attention is given to what happens after a successful cyber attack occurs. - January 30, 2009 - Savid Technologies, Inc.
Data Breach at Major Payment Processor Drives Thousands of Consumers to yasni.com Over Fears of Identity Theft
Traffic at Leading Online Reputation Management Service, yasni.com, Doubles as Millions of Credit Cardholders Become Subject to Fraud. - January 24, 2009 - yasni.com
Alvarez Technology Group Achieves SonicWALL Gold Partner Status
Luis M. Alvarez & Anil R. Melwani Designated Certified SonicWALL Security Administrators - January 20, 2009 - Alvarez Technology Group, Inc.
JMKDomains Now Offering Extended Validation Certificates
JMKDomains announced today that new Extended Validation (EV) SSL Certificates are available for sale and ready to install. An SSL Certificate is a digital credential that authenticates the identity of a Web site and encrypts information via Secure Sockets Layer (SSL) technology. Created to... - January 17, 2009 - JMKDomains
ZaKoPhone, a Web Based Phone That Works Inside the Browser Without Installation
Calling your neighbor or the uncle in Africa was never that cheap and easy, ZaKoPhone is a free Web Service that uses the newest technology to bring high-quality voice communication to people all over the world without the needs of software installation. - January 16, 2009 - ZaKoTel Telekommunikations GmbH
E-Mail with Secured Seal and Signature Replaces Expensive Legal Fax and Courier Service
The Hague, ID Control, the specialist in advanced online identity and access management, helps organizations cutting down on post, courier, fax, handling and administrational costs. ID Control today announces the launch of MailID, the worlds most easy and secure e-mail signing, encryption and decryption software to enforce compliance requirements and to ensure that confidential information is delivered securely via e-mail. - January 16, 2009 - ID Control BV
Announcement of Online Link Scan Site Launched
This online tool allows you to scan for any suspicious link that might lead you to harmful threats which can attack your computer. - January 16, 2009 - Online Link Scan
Colocation America Secures Partnership with ProtectPoint
Partnership Enhances Colocation America’s Cost Effective Suite of Managed Security Services for Small and Mid-Sized Businesses. - January 15, 2009 - Colocation America
Hosted Solutions Finishes Strong Year and Expands Management Team Naming Its First Vice President of Marketing
East Coast’s premier data center and managed services provider continues to grow despite economic downturn. - January 14, 2009 - Hosted Solutions
UPSonNet Suggests How to Protect Both Data and Budget When Buying an Uninterruptible Power Supply (UPS)
Traditionally, specifying must have requirements, and purchasing the specified product are main consecutive stages while procuring most industrial systems. UPS Market Price study, by UPSonNet contradicts assumed price to performance or cost to size correlation. Suggesting addition of Cost Oriented Reevaluation (COR) stage, to boost significantly ROI. - January 14, 2009 - UPSonNet
One Technologies Expands Into United Kingdom Credit Report and Identity Theft Prevention Markets
One Technologies, a leading U.S. based provider of online credit reporting, monitoring and identity theft prevention services, launches FreeCreditReport.co.uk—an innovative new website for residents of the United Kingdom. The latest economic news and identity theft statistics prove that... - January 10, 2009 - FreeCreditReport.co.uk
Online Identity Assurance Closes Door to Unwanted and Fake Visitor
The Hague, ID Control, the specialist in advanced online identity and access management today announced to fight online identity theft and fraud with a hassle free managed service by which users’ identities are protected with strong and advanced authentication tokens based on a monthly fee per user. - January 09, 2009 - ID Control BV
Israeli Company Attacked by Cyber Criminals
Along with the rocket attacks, Israeli websites were hit by hackers supporting terrorists. n-Trance announces that these illegal actions are considered as a violation of the international laws and will take legal measures against the cyber criminals - January 09, 2009 - n-Trance Security Ltd
REACT Systems and Impact Technologies to Provide Integrated Solution for Improving Emergency Notification
Integration improves speed, automation, accuracy and effectiveness of communication during critical events. - January 07, 2009 - REACT Systems, Inc.
Innobuzz Conducts Ethical Hacking Training at Modern School, Barakhamba Road, New Delhi
Innobuzz Knowledge Solutions and Modern School, Barakhamba Road jointly organized a training program on Information Security and Ethical Hacking. - December 28, 2008 - Innobuzz Knowledge Solutions
Motherboards.org Reviews the Thecus® N3200 NAS
The file storage system sets up folders for Photos, Music, Video, USB Copy, USB HDD, and external SATA HDD. You can grant or deny access to each folder by using the Edit button on each folder. The iTunes server configuration allows other computers on the network to access music files in the Music folder of any iTunes equipped computer. This is a great feature for those that have multiple computers with music on them. - December 27, 2008 - Thecus