Help Net Security
Government-grade voice security for BlackBerry
Cellcrypt released its high-strength government-grade encryption application for mobile devices, including BlackBerry smartphones, on both T-Mobile’s secure cellular …
nShield Edge: USB-attached hardware security module
Thales released nShield Edge, the world’s first FIPS 140-2 Level 3 validated USB-attached hardware security module (HSM). It features an integrated card reader and …
Rogue software details: PC-Guide
PC-Guide is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
The evolution of PCI DSS
The Ponemon Institute conducted a research study about the upcoming version of the Payment Card Industry Data Security Standards (PCI DSS), a new set of standards expected to …
ID Vault for iPhone: Single tap login for online accounts
White Sky introduced a secure way to access any online account from the iPhone with its ID Vault for iPhone. ID Vault is the first iPhone app that offers true single-tap …
McAfee unveils new firewall solutions
McAfee released Firewall Enterprise 8. Next generation capabilities include advancements in firewall management, application discovery and protection, and integrated layers of …
Automated penetration testing tools
Codenomicon released a toolkit for automated penetration testing which eliminates unnecessary ad-hoc manual testing. The required expertise is built into the tools making …
Enigma self-encrypted drive
Origin Storage launched the Enigma self-encrypted drive (SED). Incorporating the 256-bit AES hardware encrypted 2.5″ hard drives from Toshiba it provides permanent full …
Elcomsoft uses new hardware to speed up password recovery
Elcomsoft announced the support of Tableau TACC1441 hardware to accelerate the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups. The use of a single …
Tenable releases SecurityCenter 4
Tenable released SecurityCenter 4, the enterprise-class management console for Tenable’s Unified Security Monitoring suite of products. By centralizing system and event …
Snort 2.8.6 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
Insecure web applications greatest data threat
Most businesses, despite having numerous mission-critical applications accessible via their websites, fail to allocate sufficient financial and technical resources to secure …