Computer Security News

Security Zone: penetration testing – define your objectives – Computer Weekly

May 13, 2009/by SecureTech

Report: PennDOT values customers over security – Times-Leader

May 13, 2009/by SecureTech

Computer Security: Cyber Threats and Vulnerabilities Continue – Canada Free Press

May 13, 2009/by SecureTech

Security and device management hinder mobile business – Computer Weekly

May 13, 2009/by SecureTech

Tiger Security Update 2009-002 Available – Download Here – Softpedia

May 13, 2009/by SecureTech

Lynn McNulty, Executive Consultant at McConnell International … – PR.com

May 13, 2009/by SecureTech

As Hacking Hits Home, China Strengthens Cyber Laws – PC World

May 13, 2009/by SecureTech

Identity of hacker of state files still unknown – Richmond Times Dispatch

May 13, 2009/by SecureTech

D-Link Ups Security On Routers – socalTech.com

May 13, 2009/by SecureTech

Personal Computing: Zombies an Increasing Concern – Government Technology

May 13, 2009/by SecureTech

Forsythe Names Steve Abbott Senior Vice President of Security … – Earthtimes (press release)

May 13, 2009/by SecureTech

iYogi Acquires Computer Security Service provider, Clean Machine – VC Circle

May 13, 2009/by SecureTech

Tracking Cyberspies Through the Web Wilderness (John Markoff/New York Times)

May 12, 2009/by SecureTech

Net Nanny Named Editors’ Choice for Parental Controls by Computer … – Businesswire.com

May 12, 2009/by SecureTech

UC Berkeley Data Breach Exposes 160,000 – E-Commerce Times

May 12, 2009/by SecureTech

Tracking Cyberspies Through the Web Wilderness – Herald Tribune

May 12, 2009/by SecureTech

Sizing up security in – IDG NEWS

May 12, 2009/by SecureTech

China blocks U.S. from cyber warfare – The Washington Times

May 12, 2009/by SecureTech

Symantec Survey Reveals More Than Half of Small and Midsized … – Computerworld Australia

May 12, 2009/by SecureTech

10 tips for secure computer disposal – Zd Net Asia.com

May 12, 2009/by SecureTech

McAfee Security for Mac 1.0 Beta 1 – Free Download – Softpedia

May 12, 2009/by SecureTech

Hackers Breach UC Berkeley Computer Database – Top Tech News

May 12, 2009/by SecureTech

Mathematical theory of elliptic curves may help strengthen IT security – Newstrack India

May 12, 2009/by SecureTech

UC Berkeley Data Breach Exposes 160000 – TechNewsWorld

May 12, 2009/by SecureTech

YOUR SECURITY: New technologies improve disability process – Times-Standard

May 12, 2009/by SecureTech

Tracking Cyberspies Through the Web Wilderness – New York Times

May 12, 2009/by SecureTech