Help Net Security
Password management solution with hardware-based encryption
Lieberman Software Corporation’s new Random Password Manager 4.0 is the first privileged password management product to incorporate hardware encryption, multi-factor …
Alleged webcam hacker accused of spying on girls
IT security and control firm Sophos is warning home computer users about the importance of properly securing PCs, following news that a man who allegedly used computer malware …
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P’, automatically generate an exploit for the potentially …
Virtualization technology enables secure wireless access
Array Networks introduced WiFiProtect, an identity-based access control solution for WLAN networks. WiFiProtect’s virtualization technology automatically funnels all …
Exaprotect unveils LogManager 3.0
Most organizations struggle to capture and manage their IT infrastructure and systems logs, a critical necessity for compliance with regulatory and audit requirements. The …
BIO-key granted image identification system patent
IO-key International announced that on April 15, 2008, the U.S. Patent and Trademark Office issued US patent No. 7,359,553 covering BIO-key’s image enhancement and data …
Free tool for P2P-related file discovery
With funding from the National Institute of Justice, ATC-NY has developed P2P Marshal, a software application that automatically gathers, in a forensically sound way, all of …
Majority of users leave their wireless networks exposed
Nearly three-fifths (57 per cent) of UK businesses are leaving themselves vulnerable to hackers by not taking simple steps to protect their wireless networks, according to new …
Info on Gartner’s IT Security Summit 2008
New generations of technology-savvy users and a growing wave of gadget-prone communication devices are making their way into the workplace, bringing with them new security …
User authentication SDK for e-commerce portals
The online shopping trend is growing by leaps and bounds. At the same time, e-commerce portals for managing customers and employee extranets are gaining increasing importance. …
Nigerian scam goes 2.0 – targets LinkedIn and other social networking sites
Researchers from BitDefender have detected that social networks are the newest medium for Nigerian “4-1-9” scams. The scam has been put to use on the professional …
Latest Microsoft Security Intelligence Report
Microsoft released the fourth volume of its Microsoft Security Intelligence Report (SIR). The report focuses on the second half of 2007 and uses data derived from a range of …
Featured news
Resources
Don't miss
- Mirai botnet behind the largest DDoS attack to date
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving