Help Net Security
Self-encrypting drives based on Trusted Computing Group specifications
Hard drive vendors have started shipping self-encrypting drives based on the Trusted Computing Group’s specifications. Final specifications for client drives, data …
Nokia sponsored Maemo 5 SDK goes alpha
Nokia introduced the Maemo 5 Alpha SDK including the new UI framework and APIs for application development. The redesigned Maemo UI provides a simple and beautiful experience …
NSA Director to keynote at RSA Conference 2009
RSA Conference announced that the NSA Director Lieutenant General Keith B. Alexander will present at 11:30 a.m. PT on Tuesday, April 21, 2009. As the Director of NSA and Chief …
AppRiver adds Web filtering solution to its in-the-cloud security services
AppRiver launched SecureSurf Web Protection, which provides a combination of Web filtering and malware protection that can be deployed from a single PC to an entire enterprise …
Member of the botnet underground sentenced to 48 months in prison
Concluding the first prosecution of its kind in the nation, a man associated with the “botnet underground” was sentenced to 48 months in federal prison for using …
Twitter users hit by Chatwebcamfree attack
Twitter users should to be vigilant as approximately 750 accounts on the popular micro-blogging site have been hit by yet another hack attack. Experts at SophosLabs found that …
Dual segment 10 Gigabit intelligent bypass switch
Interface Masters Technologies unveiled the Niagara 2814 Intelligent Bypass which consists of dual 10Gb bypass segments which possess passive and active bypass switch …
The economy and cyber crime
In this uncertain global economy, you can count on one thing: crime – both in the real world and the online one – has the opportunity to thrive. According to a …
Cost-effective single board computer from Axiomtek
Axiomtek has released its new cost-effective SBC81206 PICMG 1.0 PCI/ISA single board computer, based on the Mobile Intel 945GC Express chipset to support Intel Core 2 Duo …
New malware analysis technology improves threat detection
Sunbelt Software announced its new malware analysis technology, MX-Virtualization (“MX-V”), as part of a significant enhancement to its popular VIPRE Antivirus + …
Massive Twitter account hijacking spree
As posted by Rik Ferguson to Trend Micro’s CounterMeasure blog, it appears that there is a rash of Twitter account hijacking going on this evening. Hundreds of Twitter …
Secure data communication and protection for Windows Mobile
Certgate uveiled the Protector for Smart Phones, a hardware-based security solution for the protection of data and mobile communications. A smart card of the microSD type is …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption