Help Net Security
New book: “iPhone UK: The Missing Manual”
iPhone UK: The Missing Manual, Second Edition (O’Reilly) is the first book about every Apple improvement to its own second edition–the iPhone 3G and iPhone 2.0. …
Check Point’s DynamicID simplifies two-factor authentication
Check Point announced a new authentication technology that leverages mobile devices to increase enterprises’ network security. While other solutions require multiple …
Secure Computing supplies SCADA-specific security signatures
Secure Computing is incorporating three new signature file types for SCADA-specific protocols into its Secure Firewall. SCADA (Supervisory Control and Data Acquisition) …
The insider security threat in IT and financial services
RSA announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in 2008. The survey polled 417 …
Enterprise security solution for Linux on IBM System z
SSH Communications Security introduced SSH Tectia Server for Linux on IBM System z. This new version provides a unified, end-to-end security model that extends from …
First miniature security computer for Mac desktops and laptops
The new Gatekeeper Pico for Mac and Gatekeeper Card Pro for Mac, provide 12 internet security applications on a dedicated hardware that offloads security, improves …
Voice over IP Security
With VoIP becoming practically a household name and present in organizations worldwide, we are witnessing a natural increase in attacks and other problems. With this title, …
Man indicted for alleged hack of Sarah Palin’s e-mail account
David C. Kernell, 20, was indicted by a federal grand jury in Knoxville, Tenn., for intentionally accessing without authorization the e-mail account of Alaska governor Sarah …
Consumers concerned about financial data protection
Solidcore surveyed more than 500 consumers nationwide about credit card use, and to gauge their privacy fears and buying habits when shopping at various retail stores. The …
Video surveillance dollars not just for security
Security is the best-known application of video surveillance, but by no means the only one. Transportation systems and retail are both promising markets for video …
Extensive list of new security vulnerabilities in enterprise VoIP systems
VoIPshield Laboratories made its third announcement of security vulnerabilities in Voice over IP systems marketed by Avaya, Cisco and Nortel. Vulnerabilities were also …
New Core Security IMPACT Pro 7.6
In the latest installment of CORE IMPACT Pro, Core Security added support for IPv6 infrastructure and extended the product’s powerful web application testing …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades