Help Net Security
Fingerprint solution for PCs and netbooks from AuthenTec
AuthenTec introduced a family of smart sensor hardware and software solutions designed for new consumer notebook PCs and netbooks. It includes smart fingerprint sensors …
Agent-less remote administration of Windows machines
PJ Technologies announced the release of WMIX v2 (Windows Management Instrumentation eXplorer). WMIX is a GUI based implementation of WMI technology which performs agent-less …
New model of the BlackBerry Smart Card Reader
RIM unveiled a new model of the BlackBerry Smart Card Reader – a lightweight, wearable, ISO 7816 compliant card reader that enables proximity controlled access to a …
The IEEE Standards Association announced the Industry Connections Security Group
The IEEE Standards Association (IEEE-SA) announced the Industry Connections Security Group (ICSG), a global effort to pool experience and resources in combating the systematic …
A closer look at Elcomsoft Advanced Office Password Breaker 3 Enterprise Edition
Elcomsoft Advanced Office Password Breaker breaks passwords and unlocks password-protected MS Word documents and Excel spreadsheets instead of attacking and recovering complex …
AWS Import/Export adds Export for Amazon S3
The AWS Import/Export beta now supports export from Amazon S3. AWS Import/Export accelerates moving large amounts of data into and out of AWS using portable storage devices …
New book: “Best iPhone Apps: The Guide for Discriminating Downloaders”
With over 50,000 iPhone apps to choose from, there’s a mind-boggling number of ways to make your favorite device do just about anything you can imagine – and …
Cybercriminals exploit trending topic of Ashley Greene nude pictures
Users should be wary of links to websites that are currently circulating on the web claiming to offer naked pictures of popular US film star Ashley Greene. Cybercriminals are …
Fluke Networks acquires AirMagnet
Fluke Networks signed a definitive agreement to acquire AirMagnet. Terms of the agreement will not be disclosed. The agreement is subject to customary closing conditions and …
Qualys and Modulo partner
Qualys and Modulo have formalized a partnership agreement. As part of the agreement, the companies have integrated the QualysGuard Vulnerability Management and Policy …
Virus disguised as response to craigslist “car for sale” ad
Security experts at Red Condor are warning email users about a new virus currently undetected by most virus scanners. The virus is embedded in an email that appears to be a …
Signature based scanners missed 88% of Gumblar attacks
In its quarterly Global Threat Report issued today, ScanSafe reported that at its highest peak in the second quarter of 2009, 88% of malware blocks were zero day threats, …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits