Help Net Security
TransCore broadens portfolio of RFID technology
TransCore introduces three new RFID transponders, including the Interagency Group (IAG) protocol standard onboard unit, the nationally interoperable eZGo Anywhere onboard unit …
PDFResurrect: PDF analysis and scrubbing utility
PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby …
RBS Worldpay website problems down to lack of code auditing
News that RBS Worldpay’s various web portals are “riddled with holes” according to a hacker have been met with the expected public relations spin that you …
Radware unveils DefensePro 5.0
Radware released DefensePro 5.0, the intrusion prevention system (IPS) which offers a way to guard against vulnerabilities in the network. Leveraging a ‘booster …
New book: “Cloud Computing: Implementation, Management, and Security”
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, …
Apple Xsan 2.2 released
Apple today released version 2.2 of Xsan, its 64-bit cluster file system specifically designed for small and large computing environments. The problem fixed in Xsan 2.2 was …
PhoneCrypt now available for the iPhone
PhoneCrypt is a solution based in military grade encryption (RSA 4096 bits and AES 256 bits). It works in real time, without interfering in the functions of the mobile phone, …
Intrusion prevention for small and medium enterprises
TippingPoint introduced two new intrusion prevention systems designed to secure network traffic for small and medium enterprises. The TippingPoint 110 and TippingPoint 330 …
Enterprise Wi-Fi BlackBerry client
iPass launched Blackberry iPassConnect Client, an enterprise Wi-Fi client. The application works in conjunction with the BlackBerry Enterprise Server, giving IT administrators …
Video: Man busted installing ‘skimming’ device to ATM
Below is CCTV footage form Brazil.
Draft eSecurity code for improved net security
Australia’s Internet Industry Association (IIA) has released a draft eSecurity code to ISPs throughout the continent, to serve as a guide for improving net security. …
Cross Widget DOM access: Spy on the page
Widgets, Gadgets or Modules are very common and powerful feature of Web 2.0 applications. They convert a single loaded page in the browser to multi-threaded application. They …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity