Help Net Security
Strong demand for fingerprint-enabled Symbian phones
AuthenTec has just surpassed the 7 million shipment milestone of AuthenTec-enabled Symbian phones and that it has joined the Symbian Partner Network. The two companies have …
Software techniques to prevent cold boot attacks on encryption keys
BitArmor released a new set of software-driven techniques that can prevent Cold Boot attacks by protecting cryptographic keys in encryption systems. Patrick McGregor Ph.D., …
Consumer Reports rates security suites
New computers almost always come loaded with the trial version of a software suite designed to thwart spam, viruses, and spyware. But Consumer Reports’ latest tests of …
U.S. consumers lost nearly $8.5 billion to online threats
The risks associated with using the Internet remain high, yet many consumers are still complacent about online security according to the latest survey from Consumer Reports. …
Standards-based access control solution
Juniper Networks announced the next generation of its standards-based Juniper Networks Unified Access Control (UAC) 2.2 software and the Juniper Networks Infranet Controller …
Automate the exchange of product design data in the enterprise
Trubiquity launched TRUfusion, a new software product that automates the exchange of product design data across a customer’s extended enterprises. TRUfusion enables the …
Automated backup/synchronization software
NewTech Infosystems announced NTI Shadow v4.0, an always-on, data backup solution for PC, Mac and network users. Shadow v4.0 has been enhanced with many new convenience …
Safeguard inventory and sensitive assets
MIKOH Corporation introduced Smart&Secure Warehouse, a packaged solution that delivers physical security and tamper evidence for inventory management and advanced RFID …
Signature-less real time protection against malware
NovaShield announced NovaShield AntiMalware version 2.0, a behavior-based security software for Windows XP and Vista designed specifically to detect, block, and remove …
Cybercrime and Politics
As citizens of the United States prepare to cast their votes in the upcoming presidential election, the time is right to consider what implications, if any, Internet-borne …
Detailed malware report for July 2008
The format of the ‘Virus Top Twenty’ reports from Kaspersky Lab has changed as of July 2008. The previous method used to compile these reports and to assess the …
Apple update patches DNS vulnerability
Today Apple released Security Update 2008-005 and below is the list of updates. Open Scripting Architecture A design issue exists in the Open Scripting Architecture libraries …
Featured news
Resources
Don't miss
- The hidden risk in SaaS: Why companies need a digital identity exit strategy
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
- RansomHub affiliate leverages multi-function Betruger backdoor
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery