Help Net Security
Two new Sourcefire security appliances
Sourcefire announced two new appliances, increasing customers’ flexibility to deploy the exact security solution to meet their specific network demands. With a complete …
StoneGate’s new unified threat management solution
Stonesoft introduced the StoneGate UTM solution for remote locations, further enhancing its solution suite for both physical and virtual environments. Available as an integral …
Samsung ultra-lightweight fingerprint-enabled notebook
AuthenTec’s small form factor AES1610 is integrated as a standard feature on the first Samsung consumer notebook to leverage the convenient security of fingerprint …
IT security threats in wake of financial crisis
EMA has released a new advisory note in which their research director, Scott Crawford, highlights the impact of the current financial industry meltdown, and its implications …
Global RFID market to reach $5.3 billion this year
The worldwide RFID market will exceed $5.3 billion in 2008, according to a new forecast from ABI Research. Annual revenue growth will increase over the next five years, …
War driving in Santiago Chile
Between 6th and 11th October, we went war-driving in Santiago, the capital of Chile, with the aim of collecting data on the city’s wifi networks. Why did we choose …
October 2008 malware and spam geographical and vertical trends
October 2008 MessageLabs Intelligence Report highlights the following trends: Geographical Trends: In October, spam levels in Hong Kong fell by 1.4 percent but the country …
New Sprint Secure Web Protection managed service
Sprint announced the availability of Sprint Secure Web Protection, managed service which will include both a network and premise-based solution for customers to choose from; …
TeamViewer Portable for secure remote access from public workstations
TeamViewer Portable is an USB option for professionals accessing confidential information from public computers. The product provides users with secure remote access to a …
Reconsidering physical key secrecy: teleduplication via optical decoding
Researchers from the University of San Diego (Benjamin Laxton, Kai Wang and Stefan Savage) developed Sneakey, a system that correctly decoded keys from an image that was taken …
Suite360 for automated security and compliance auditing
New nCircle Suite360 delivers a fully integrated, agentless product line for auditing the entire information technology stack across a global network. Comprised of agentless …
Increase in spam productivity due to world financial crisis
The worldwide financial crisis sparked an increase in spam production following the initial mid-September collapse of Lehman Brothers Bank, Bank of America and AIG, according …
Featured news
Resources
Don't miss
- Don’t let these open-source cybersecurity tools slip under your radar
- Cyber trends set to influence business strategies
- How to use Apple’s App Privacy Report to monitor data tracking
- North Korean IT workers are extorting employers, FBI warns
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard