Help Net Security
WordPress worm: upgrading is vital
WordPress warns that a worm has been making the rounds of the old versions of its platform. Blog writers who didn’t get around to upgrading their versions remained …
SaaS vulnerability scanning for internal networks
Comodo introduces vulnerability scanning for internal networks in the cloud with the newest release of its HackerGuardian. Previously, internal network scans required …
F-Secure Internet Security 2010 pre-installed on Nokia Booklet 3G
F-Secure and Nokia are extending their collaboration to include Internet security on computers. Owners of the Nokia Booklet 3G mini-laptop get a free 30-day trial version of …
The path to comprehensive ID management
There have been many changes since enterprises first looked at implementing smart card-based common access card programs in the 1990s. Although some large corporations …
Encrypted mobile phone calls from anywhere
Cellcrypt Mobile is now available over Inmarsat‘s broadband satellite services, enabling encrypted voice calls to be made on popular smartphones from anywhere for the …
OpenLR: Opens source dynamic location referencing technology
TomTom developed a dynamic location referencing technology as an open standard for the navigation, mapping and ITS Industry, called OpenLR. OpenLR has been designed for …
SCALE 8X Call For Papers now open
The 8th Annual Southern California Linux Expo scheduled for February 19-21 2010 is taking place at the Westin Hotel near Los Angeles International Airport. SCALE 8x will have …
Alarming increase in ATM crime
With the annual cost of ATM crime in Europe approaching half a billion Euros, ENISA, the European Network and Information Security Agency, is urging consumers to be more aware …
All-in-one software protection solution by Arxan
Arxan introduced the all-in-one Software Protection Solutions suite, designed to protect and respond to a variety of ISV application attacks, such as binary code modification, …
Simplified authentication solution from Thales
Thales announced SafeSign Single Sign On, the latest addition to the SafeSign strong authentication and ID management product line. SafeSign Single Sign On provides simplified …
Cybercriminals exploit California bush fires
Cybercriminals are not known for their high moral standards, so it comes as no surprise they are using people’s concern and interest regarding the California bush fires …
Workshop on Aggressive Computing and Security Call for Papers
In recent years, major security conferences preferred to select papers according to hot topics. As a result excellent yet unorthodox scientific papers are often rejected and …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage