Please turn on your JavaScript for this page to function normally.
BIO-key granted image identification system patent

IO-key International announced that on April 15, 2008, the U.S. Patent and Trademark Office issued US patent No. 7,359,553 covering BIO-key’s image enhancement and data …

Free tool for P2P-related file discovery

With funding from the National Institute of Justice, ATC-NY has developed P2P Marshal, a software application that automatically gathers, in a forensically sound way, all of …

Majority of users leave their wireless networks exposed

Nearly three-fifths (57 per cent) of UK businesses are leaving themselves vulnerable to hackers by not taking simple steps to protect their wireless networks, according to new …

Info on Gartner’s IT Security Summit 2008

New generations of technology-savvy users and a growing wave of gadget-prone communication devices are making their way into the workplace, bringing with them new security …

User authentication SDK for e-commerce portals

The online shopping trend is growing by leaps and bounds. At the same time, e-commerce portals for managing customers and employee extranets are gaining increasing importance. …

Nigerian scam goes 2.0 – targets LinkedIn and other social networking sites

Researchers from BitDefender have detected that social networks are the newest medium for Nigerian “4-1-9” scams. The scam has been put to use on the professional …

Latest Microsoft Security Intelligence Report

Microsoft released the fourth volume of its Microsoft Security Intelligence Report (SIR). The report focuses on the second half of 2007 and uses data derived from a range of …

World’s first security mini-computer inside computer

Yoggie Security Systems released the world’s first laptop embedded ExpressCard based mini-computer, designed to provide the most comprehensive Internet security. The …

Free SysInspector for free in-depth computer diagnostics

ESET released SysInspector, a free comprehensive utility that examines various operating system elements, including running processes, registry content, startup items and …

The Fundamentals of Physical Security

Deviant Ollam works as a network engineer and security consultant but his strongest love has always been teaching. A supporter of First Amendment rights who believes that the …

A chunk of Olympic themed targeted trojans

The world’s athletes and hackers now share a common focus – the Beijing Olympics. Whilst the athletes have a legitimate reason to concentrate on the Games, …

New IBM security services for mid-sized businesses

IBM introduced several new services to help mid-sized businesses better manage risk and improve the security of their IT systems. IBM developed these services in response to …

Don't miss

Cybersecurity news