Recent Headlines
Within Security Software
Thetus and Blue Light LLC Partner to Offer Specialized Training of All-Source Analysis Solution
Partnership combines veteran trainers with collaborative analysis environment to make guidance available to worldwide audience. - April 18, 2015 - Thetus
Macrium Software to Attend and Speak at IP Expo Manchester
Macrium Software, the disaster recovery solution specialists, are pleased to be exhibiting and speaking at IP Expo in Manchester on 20-21 May 2015. IP Expo is coming to Manchester for the first time this year after having successfully run the IP Expo event series through London and Europe. - April 16, 2015 - Macrium Software
MENTIS Team Travels to Collaborate 15 to Discuss Data Masking in Oracle EBS and PeopleSoft Environments
Experts in data security will answer important questions about sensitive data management. - April 12, 2015 - MENTIS Software
AKATI Consulting Presents at CICRA’s Fourth Ethical Hacker’s Forum
The 4th Ethical Hacker's forum organised by CICRA Holdings was held recently in Colombo, Sri Lanka. This event was captioned ‘Security through Obscurity: Is it a Myth’. Krishna Rajagopal, CEO of AKATI Consulting was invited to enlighten the gathering at this quarterly event. Ethical... - April 12, 2015 - AKATI Consulting
AKATI Consulting Forms Strategic Alliance with IMPACT
AKATI Consulting signed a Memorandum of Understanding (MoU) with the International Multilateral Partnership Against Cyber Threats (IMPACT) today. AKATI Consulting entered to this agreement with the objective of establishing a strategic alliance which will enable diversification of its... - April 12, 2015 - AKATI Consulting
AKATI Consulting Enlightens Law Enforcement on Cybercrimes
Krishna Rajagopal, CEO of AKATI Consulting was invited as a guest speaker to the Commercial Crime Investigation Department (CCID) Conference held in Kuala Lumpur. The presentation was titled 'What the hack?’ The objective of this CCID conference was to provide a platform for the Director of... - April 12, 2015 - AKATI Consulting
AKATI Consulting Launches Alpha Computer Emergency Response Team (ACERT)
AKATI Consulting’s Alpha Computer Emergency Response Team (ACERT) has launched and ready to fight Cyber Security Incidents. - April 12, 2015 - AKATI Consulting
AKATI Consulting Inspires the Ethical Hackers in Sri Lanka
Krishna Rajagopal, CEO of AKATI Consulting held enlightened Ethical Hacker's forums in 2014. - April 12, 2015 - AKATI Consulting
AKATI Consulting Joins ASEANFIC as Partner
AKATI Consulting was invited by SecureMetric Technology to be one of its supporting vendor in the ASEAN Financial Institution Conference (ASEANFIC), in Manila. Krishna Rajagopal, CEO AKATI Consulting delivered his presentation on 'E-banking and Hackers'. He spoke about the risks in E-banking and... - April 12, 2015 - AKATI Consulting
Amped Software to Reveal New Plans for Image and Video Authentication at the Forensics Europe Expo and Teach Investigators How to Productively Analyze Digital Multimedia
Amped Software (www.ampedsoftware.com), a leading provider of innovative technology for the analysis, enhancement and authentication of images and videos for forensic, security and investigative applications, today announced that it will present two seminars on 21 and 22 April at this year’s Forensics Europe Expo. - April 11, 2015 - Amped SRL
Thursby Software Selected as DISA’s Two-Factor CAC Authentication for Apple iOS Mobile Devices
In conjunction with the Digital Management, Inc. (DMI) Enterprise Solutions Group’s commitment for the finest government mobile solutions, DMI has sub-contracted with Thursby Software Systems for CAC enabling DoD Defense Information System Agency (DISA) Apple iOS mobile devices. This... - April 07, 2015 - Thursby Software Systems, Inc.
ITC Digital Announced as StratoKey UK Partner
Due to increased demand for cloud encryption and web app security in the UK, StratoKey adds ITC Digital as value-added reseller to promote and support StratoKey in the region. - April 04, 2015 - StratoKey
MENTIS Software Announces Release 7.2.3
Major Upgrade to Data Masking & Monitoring security solutions offers a data-centric approach to managing and keeping at-risk sensitive data safe across the enterprise. - April 03, 2015 - MENTIS Software
MYMobile Security Found That 9 Out of 10 in the Mobile Industry Feared Identity Theft During MWC15
During MWC15 MYMobile Security, a company providing a range of mobile Security services, gave away free WiFi security to all MWC15 visitors and conducted a survey on WiFi security issues that generated interesting results on WiFi hotspot issues. - April 03, 2015 - MYMobile Security
VIMRO LLC’s Alexander Chizhik, Receives 2015 General Council Award
SmartCEO Magazine today announced Alexander Chizhik, COO and General Council at VIMRO, LLC has been awarded a Baltimore Executive Management Award in the category of General Council. - March 23, 2015 - VIMRO, LLC
DataNumen File Splitter Helps Split and Join Large Files Effortlessly
DataNumen has released DataNumen File Splitter v. 1, a free Windows utility program that makes it easy for users to split files into segments and rejoin them into a single file again. The software is designed for backing up files that are larger than the storage medium that will be used to hold the... - March 22, 2015 - DataNumen
New Savanna 4.2 Delivers IBM Analyst’s Notebook Integration for Fast and Easy Multi-Source Analysis
New collaborative and link analysis features enhance analysis environment to make the most of information and streamline discovery and decision making. - March 20, 2015 - Thetus
CurrentWare Unveils Web Filtering for Mobile Devices
CurrentWare (a division of Codework Inc), a leader in Internet filtering and restriction software solutions, announced the release of CurrentWare Gateway, that extends the reach of Internet security to wireless devices and non-windows systems. - March 18, 2015 - CurrentWare
For the First Time in the World Stealthphone Information Security System
Mobile Trust Telecommunications company has developed Stealthphone, the first mobile phone and PC security system in the world. Stealthphone guarantees strong encryption of: Voice and data transmitted over Stealthphone IP-servers; Voice transmitted over existing communication systems: GSM, landline, satellite, IP-telephony; Data stored on PC and mobile phone. Encrypted information can be transferred in an encrypted mode via all mail services or in the social media. - March 12, 2015 - Mobile Trust Telecommunications
No Speed Limits - Watch the Formula One World Championship® with VPN Unlimited
In anticipation of the fastest competition, Formula One World Championship®, Simplex Solutions Inc. gives away 10 additional days to all 10-day plans purchases of the fastest VPN service, VPN Unlimited. - March 12, 2015 - Simplex Solutions Inc.
GES Announces Launch of TX-Speed – Ultra-Low Latency STP Solution
Hong Kong based Global eSolutions (HK) Limited (GES), a leading financial trading platform vendor, announces the launch of its new STP solution – TX-Speed, which is especially designed for brokerages who adopt A book or A/B mix model. The setup and deployment of TX-Speed is extremely easy. - March 11, 2015 - Global eSolutions (HK) Limited
VeriPic Hosts the 2nd Annual Digital Evidence Conference in Pasadena, CA
The second annual Digital Evidence Conference for the law enforcement community will be held at the Hilton Pasadena Hotel, April 27 & 28, 2015. The conference will focus on the best practices and implementation of Body Worn Cameras (BWCs) for Law Enforcement Agencies. - March 06, 2015 - VeriPic, Inc.
"See Inside the Mind of a Hacker" Seminar Set for March 26, 2015
Internet Security Seminar for Business Owners, CIOs & IT Directors Set for March 26, 2015 in Lakewood Ranch, Florida - March 05, 2015 - MapleTronics Computers
PandaLabs Neutralized 75 Million New Malware Samples in 2014, Twice as Many as in 2013
34% of all malware ever created was released in 2014, an average of 200,000 new malware strains per day. The global infection rate in 2014 was 30.42% - UK infection rate of 22.14%. - March 04, 2015 - Panda Security
Scurit, LLC Upgraded Their Free Website Malware Scanning Tool
Scurit, LLC has upgraded their free website malware scanner to include some of the latest signatures for website malware. The tool now detects some of the newer, more advanced malware signatures. - March 02, 2015 - Scurit, LLC
Versatile Security Releases vSEC:CMS K2.0
Versatile Security announces the release of vSEC:CMS K-Series version 2.0. Their most popular smart card tool ever - just got even better. - March 02, 2015 - Versasec AB
SysTools DMG Viewer v1.0 for Windows Marks Its Official Launch
The handout is used as the primary source to spread a word regarding the official launch of DMG Viewer built for Windows Operating System produced by one of the notable software developing firms worldwide. - February 27, 2015 - SysTools
TITUS Named One of the "500 Hot Cybersecurity Companies to Watch in 2015"
TITUS has been named to the Cybersecurity Ventures first annual list of top 500 Hot Cybersecurity Companies it Watch in 2015. - February 25, 2015 - TITUS
Security Warning: Antivirus Firm Thirtyseven4 Alerts Ransomware Infections Increasing
Ransomware detection up over 40% in January 2015; Thirtyseven4 Cryptobit decryption tool approaches 250,000 downloads - February 24, 2015 - Thirtyseven4, LLC
Cyber Security Web Site Dedicated to C-Suite and Business Personnel Launches
TheCyberSecurityPlace.Com announces the availability of a web site dedicated to disseminating important cyber security issues facing C-Suite and Business personnel. - February 22, 2015 - The Cyber Security Place
WiFiConsulting, Inc. Unveils Tor and a VPN Client on a Tiny Hardware Firewall
Security and Privacy, Meet Anonymity. Introducing the ultimate in endpoint protection. In this age of supercookies, zero day exploits, and Snowden revelations anonymity is harder to hold on to than a fading memory. The Tiny Hardware Firewall adds a layer of anonymity to the security of a hardware firewall and the privacy of a VPN. - February 16, 2015 - WiFiConsulting, inc.
SQN Banking Systems Unveils Mobile Signature Capture Application at BAI Retail Delivery Show
SQN Banking Systems, a leading provider of integrated fraud detection and process improvement products for the financial industry. - February 15, 2015 - SQN Banking Systems
DataNumen Disk Image 1.5 Software for Data Managers, Forensics Professionals
DataNumen has released DataNumen Disk Image v. 1.5, a free Windows program that creates a disk image from any drive on the computer, and allows users to easily restore that image to the drive. The software clones the drive's data byte by byte. In addition to facilitating the restoration of data... - February 15, 2015 - DataNumen
Coalfire Forecasts Slowdown in Card Data Security & Compliance
Webinar will address PCI 3.0 compliance requirements that are creating assessment hurdles for merchants. - February 10, 2015 - Omega ATC
GES Achieved Great Success in iFX EXPO Asia 2015
Hong Kong based Global eSolutions (HK) Limited (GES), a leading financial trading platform vendor, took part in the iFX EXPO Asia 2015 on the 28th and 29th of January in Hong Kong and achieved great success. As one of the prominent exhibitors, GES (Booth no. 44) showcased a series of core... - February 10, 2015 - Global eSolutions (HK) Limited
motionQR Launches from Stealth Mode
motionQR is an innovative new company, that provides a secure mobile digital delivery system. Based on 14 years' research and development, motionQR is pioneering the next generation of online and offline use of mobile devices. Last year was very busy for motionQR. After bringing on a new CEO,... - February 09, 2015 - motionQR
Panda Security UK Scoop Double Award at International Corporate Identity Event
Panda Security announce new corporate identity and strategic focus. Two top awards go to Panda Security UK for Global Sales Performance and Best Marketing Team - February 02, 2015 - Panda Security
Panda Security Announces New Growth Strategy and Identity Change #PandaSimplexity
The company’s internal and external transformation process has resulted in the birth of a new Panda based on the concept of “simplexity.” Panda’s rebranding initiative signals the beginning of an ambitious five-year growth plan. - February 01, 2015 - Panda Security
CIO Review Rated SysTools as Company of the Year 2014
This release has been out to make users acquainted with an emerging company known for its dedicated contribution in the field of cyber-forensics. - January 30, 2015 - SysTools
Secure Islands Opens U.S. Headquarters; Taps Top Software Executive Paul Gabrik as Executive Vice President of Sales
Innovative Information Protection Company Ramps to Meet Global Demand for its Disruptive Approach to Information Protection: Data Immunization - January 24, 2015 - Secure Islands - Data Security Solutions
GES Will Take Part in iFX EXPO Asia 2015 - the Largest Financial B2B Exposition in Asia
Hong Kong based Global eSolutions (HK) Limited (GES), a leading financial trading platform vendor, will participate in iFX EXPO Asia 2015 which will take place on the 28th and 29th of January at the Hong Kong Convention & Exhibition Centre. GES will showcase a series of core products,... - January 23, 2015 - Global eSolutions (HK) Limited
Gluu Server 2.0 Achieves Industry’s Most Comprehensive Open Source Access Management Platform
The Gluu Server Community Edition (CE) 2.0 now ships with support for the UMA, OpenID Connect, SAML, and CAS security protocols. - January 22, 2015 - Gluu, Inc.
Luoyang Xiabing Software Technologies Ltd Offers Ace Secret Disk to Protect Data Security by Creating Secret Disk on Computer
When it comes to the issue of information security, most people should be afraid but cannot come up with a solution. Here a well-known utility Ace Secret Disk, developed by Luoyang Xiabing Software Technologies Ltd, may settle down the headache. It is designed to be a secure tool for users to protect their data or information from leakage. - January 21, 2015 - Luoyang Xiabing Software Technologies Ltd
Bulgarian International Airports Implement Vision-Box®’s Automated Border Control eGates to Improve Passenger Experience
The Bulgarian Ministry of Interior has inaugurated a new Automated Border Control solution at the Varna and Burgas International Airports. The implementation of Vision-Box®’s ABC technology represents a shift from the traditional border control to a new paradigm where biometric technology and self-service offer the perfect match. - January 16, 2015 - Vision-Box
Time to Review Your Workplace Security - A Wake-up Call
Changes in the nature of security threats facing many organisations are forcing them to review their security arrangements. Rob Chapman of Borer, a UK-based access control company puts the case for using high secure access control for commercial buildings. - January 15, 2015 - Borer
Thursby’s PKard for Good Secures Key Mobile Workflows with Smart Card Two-Factor Authentication
Thursby Software Systems, Inc. has released PKard® for Good v2.0, a secure version of its PKard Pro application developed on the Good Dynamics® Secure Mobility Platform. PKard for Good integrates with the Good Dynamics Platform so that it can leverage an additional level of security found... - January 14, 2015 - Thursby Software Systems, Inc.
Hetman Software Updates the Entire Range of Its Data Recovery Tools
At the beginning of the year, Hetman Software updates its entire range of data recovery tools, adding the ability to resume the scanning process if it gets interrupted. In addition, all tools comprising Hetman’s 2015 range can now save the result of disk scanning and analysis, allowing the user to use any other Hetman Software tool to actually recover the data. As a result, the scanning and recovering stages become independent to allow much greater flexibility than ever. - January 12, 2015 - Hetman Software
SnoopWall Enlists as Data Privacy Day Champion and Commits to Respecting Privacy, Safeguarding Data and Enabling Trust
Today SnoopWall announced that it is now a Champion of Data Privacy Day (DPD). As a DPD Champion, SnoopWall recognizes and supports the principle that organizations, businesses and government all share the responsibility of being conscientious stewards of personal information by respecting privacy,... - January 09, 2015 - SnoopWall
Fabulous CHK File Recovering Software – CHK File Recovery from Luoyang Xiabing Software Technologies Ltd
Luoyang Xiabing Software Technologies Ltd introduced its updated and popular CHK File Recovery 1.02 with the powerful feature of recovering file types. - January 08, 2015 - Luoyang Xiabing Software Technologies Ltd
Luoyang Xiabing Software Technologies Ltd Released PC Monitor Expert for Monitoring Computer Activities
Recently Luoyang Xiabing Software Technologies Ltd released a trusted computer monitoring software, PC Monitor Expert, monitoring and controlling all activities and operations on the monitored computer. Known for powerful monitoring and stealth operation, it sets fifteen major functions in one. - December 26, 2014 - Luoyang Xiabing Software Technologies Ltd