News

Business applications

  • January 23, 2007 23 Jan'07

    Veracode launches on-demand code analysis service

    New start up Veracode gives customers the ability to analyse the application binary, and not simply the source code.

  • January 23, 2007 23 Jan'07

    McAfee: Malware all about ID theft

    The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee.

  • January 17, 2007 17 Jan'07

    Companies take IM threats seriously

    Wesabe is a brand new money management community. It takes threats to IM as seriously as those targeting email and web applications

  • January 16, 2007 16 Jan'07

    Fortify Software to acquire Secure Software

    The acquisition of Secure Software will allow Fortify to expand into the requirements and design phases of the software development lifecycle, the company said.

  • January 15, 2007 15 Jan'07

    Core Security offers powerful testing tool

    We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks.

  • January 15, 2007 15 Jan'07

    Apere's IMAG 500 a tough sell

    Product review: Apere says many of the issues we encountered are addressed in its next release, but mid-enterprise businesses may not have the tolerance for this product.

  • January 11, 2007 11 Jan'07

    Oracle emulates Microsoft with advance patch notice

    Oracle will patch 52 security flaws across its product line Tuesday, according to its inaugural CPU advance notification bulletin.

  • January 10, 2007 10 Jan'07

    Sophos acquires Endforce to add NAC

    Antivirus vendor Sophos is rounding out its email Web and desktop security software with Endforce's network access control (NAC) software.

  • January 09, 2007 09 Jan'07

    Remote flaw in Vista could earn finder $8,000

    VeriSign Inc.'s iDefense Labs is offering an $8,000 bounty to any researcher who finds a remotely exploitable flaw in Windows Vista.

  • January 09, 2007 09 Jan'07

    Network configuration management key to VoIP success

    While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error.