Help Net Security
The US continues its reign as the king of spam
The United States continues its reign as the king of spam, relaying more than 13% of global spam, accounting for hundreds of millions of junk messages every day, according to …
Perception of data security at odds with reality
Nearly three-quarters of organizations believe they have adequate policies in place to protect sensitive, personal information, yet more than half have lost sensitive data …
Secure USB flash drive with on-board PIN pad
The LOK-IT is a USB flash drive with a hardware-based security system that requires users to log in on a self-contained, on-board PIN pad. The PIN pad is not connected to the …
Lansweeper 4.0: Network inventory tracking
Lansweeper 4.0 is a Windows network inventory application that will allow yo to do a complete inventory of your Windows network without the need to install an agent on all …
Government-grade voice security for BlackBerry
Cellcrypt released its high-strength government-grade encryption application for mobile devices, including BlackBerry smartphones, on both T-Mobile’s secure cellular …
nShield Edge: USB-attached hardware security module
Thales released nShield Edge, the world’s first FIPS 140-2 Level 3 validated USB-attached hardware security module (HSM). It features an integrated card reader and …
Rogue software details: PC-Guide
PC-Guide is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
The evolution of PCI DSS
The Ponemon Institute conducted a research study about the upcoming version of the Payment Card Industry Data Security Standards (PCI DSS), a new set of standards expected to …
ID Vault for iPhone: Single tap login for online accounts
White Sky introduced a secure way to access any online account from the iPhone with its ID Vault for iPhone. ID Vault is the first iPhone app that offers true single-tap …
McAfee unveils new firewall solutions
McAfee released Firewall Enterprise 8. Next generation capabilities include advancements in firewall management, application discovery and protection, and integrated layers of …
Automated penetration testing tools
Codenomicon released a toolkit for automated penetration testing which eliminates unnecessary ad-hoc manual testing. The required expertise is built into the tools making …
Enigma self-encrypted drive
Origin Storage launched the Enigma self-encrypted drive (SED). Incorporating the 256-bit AES hardware encrypted 2.5″ hard drives from Toshiba it provides permanent full …
Featured news
Resources
Don't miss
- Security at AI speed: The new CISO reality
- Apple privacy labels often don’t match what Chinese smart home apps do
- In GitHub’s advisory pipeline, some advisories move faster than others
- Don’t panic over CISA’s KEV list, use it smarter
- Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)