Help Net Security
VoIPshield uncovers more VoIP security vulnerabilities
VoIPshield made its second announcement of security vulnerabilities in Voice over IP systems marketed by Avaya, Cisco and Nortel. This brings the total number of vulnerability …
Secure USB token for passwords and network identities
SCM Microsystems announced CHIPDRIVE MyKey, a new, highly secure USB device that makes it safer and easier for people to access the Internet and information networks. Based on …
First tri-band WLAN module in SDIO card form factor
Silex Technology unveiled the SX-SDWAG, a wireless module that provides 802.11a/b/g capabilities in an SDIO card form factor. Designed for wireless local area network (WLAN) …
6 tips for preventing laptop theft or loss
Absolute Software, the leading provider of patented computer theft recovery offers some advice on how to avoid becoming the next data loss headline: 1. Visual deterrents …
Details on a major vulnerability affecting Yahoo! Mail
Cenzic today published an advisory regarding a vulnerability discovered in Yahoo! Mail. This Cross-Site Scripting vulnerability allows attackers to steal Yahoo! identities and …
Is China leaving the Internet’s back door open?
The majority of the Internet’s malware-infected websites are located on Chinese networks, finds a new report released today by StopBadware.org, the university-based …
MultiFactor SecureAuth for Cisco VPN access enables PCI compliance
MultiFactor announced the availability of SecureAuth 4.5 for Cisco VPN Authentication, a secure access solution addressing specific PCI compliance requirements for large …
Q&A: The DNSChanger Trojan
Christoph Alme is the Principal Engineer and Team Lead of anti-malware research at Secure Computing Corporation. He is the inventor of several patent-pending key technologies …
APSolute Immunity provides networks with ability to fight emerging threats
Radware introduced its APSolute Immunity security initiative, a new strategic approach that maintains business continuity by protecting the applications infrastructure against …
More malicious attacks on the Threat Horizon
The Information Security Forum (ISF) is warning of an increase in malicious threats including attacks from organised crime and industrial espionage, along with a rise in …
Malware growth at a higher level than ever before
In its 2008 first half data security summary, F-Secure reports malware growth rate at a higher level than ever before. This recent explosion of malware doesn’t …
New book: “Your Brain: The Missing Manual”
Your Brain: The Missing Manual is a practical look at how to get the most out of your brain — not just how the brain works, but how you can use it more effectively. What …
Featured news
Sponsored
Don't miss
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)
- Review: Action1 – Simple and powerful patch management