Help Net Security
How B2B Gateways Affect Corporate Information Security
B2B gateways were introduced in 2003, marking the first time IT professionals could deploy best-of-breed managed file transfer tools without sacrificing their larger …
All optical 100 Gbps cross connect for test lab automation
MRV announced the Optical Cross Connect 320 (OCC 320), a new high data-rate, all optical physical layer switch as the latest member of its family of test automation products …
Phone-based service fights threats to corporate networks
Positive Networks announced PhoneFactor 2.1, a phone-based, two-factor authentication service which allows companies to rapidly enable two-factor authentication to secure …
Microsoft releases 11 security bulletins
Another Patch Tuesday and Microsoft comes out with a variety of patches, and this series is quite serious. Users are recommended to update as soon as possible. The critical …
Lockheed Martin develops early warning for maritime security
Lockheed Martin has developed the Suspicion Vessel Focuser (SVF) – a novel software technology that allows naval watchstanders to monitor large numbers of ships and …
The impact of identity theft in California
A comprehensive study exploring the identity theft crisis in California was released today by Identity Theft 911. In addition to detailing the increasing diversity of …
Mobile phone with fingerprint biometrics
Lenovo Mobile selected Atrua’s made-for-mobile fingerprint solution for Lenovo’s P960 mobile phone – Lenovo’s first commercial mobile phone to …
Wireless and wired devices in hazardous environments
Digi International introduced a line of wired and wireless device networking solutions designed for reliable operation in hazardous environments. The product line includes the …
High-end cameras for professional security and surveillance
D-Link introduced three high-end fixed network cameras designed for professional surveillance and security applications, providing powerful and versatile security solutions …
Blended threats increase as malicious content grows more enterprising
Secure Computing published the company’s Q2 Internet Threat Report containing data and analysis from the Secure Computing research team. Among other findings, the report …
New book: “No Root for You”
Over the years, Gordon L. Johnson has realized the information available for non-experts concerning network auditing is rather scarce. His new book, “No Root for …
Surf Jacking: HTTPS Will Not Save You
In this paper we will describe a security issue that affects major web sites and their customers. Attackers exploiting this vulnerability are able to hijack an HTTP session …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes