Help Net Security
Private eyes jailed in industrial espionage spyware case
According to media reports, four members of the Israeli Modi’in Ezrahi private investigation firm have been sentenced after they were found guilty of using a Trojan …
Data integrity and confidentiality at Layer 2
New Soft-MACsec is a modular, portable implementation of the IEEE Std 802.1AE-2006 MACsec standard for network Layer 2 integrity and confidentiality. Soft-MACsec uses a …
New security gateway virtual appliances
Secure Computing announced it is working with VMware to provide customers with security gateway virtual appliances for organizations of all sizes. These appliances for VMware …
Data encryption solution that maintains hard disk bootability
CMS Products announced the inclusion of an innovative new security feature within its BounceBack Professional Disaster Recovery Software. BounceBack Professional soon will …
Centennial Software acquired by FrontRange Solutions
FrontRange Solutions has acquired Centennial Software. Centennial a developer of dynamic infrastructure management products, including auto-discovery, inventory management and …
Hitachi ID releases ID-Archive 5.0
Hitachi ID Systems released ID-Archive 5.0 that builds on technology from the next generation Hitachi ID Management Suite to offer more secure and robust infrastructure for …
Password management solution with hardware-based encryption
Lieberman Software Corporation’s new Random Password Manager 4.0 is the first privileged password management product to incorporate hardware encryption, multi-factor …
Alleged webcam hacker accused of spying on girls
IT security and control firm Sophos is warning home computer users about the importance of properly securing PCs, following news that a man who allegedly used computer malware …
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P’, automatically generate an exploit for the potentially …
Virtualization technology enables secure wireless access
Array Networks introduced WiFiProtect, an identity-based access control solution for WLAN networks. WiFiProtect’s virtualization technology automatically funnels all …
Exaprotect unveils LogManager 3.0
Most organizations struggle to capture and manage their IT infrastructure and systems logs, a critical necessity for compliance with regulatory and audit requirements. The …
BIO-key granted image identification system patent
IO-key International announced that on April 15, 2008, the U.S. Patent and Trademark Office issued US patent No. 7,359,553 covering BIO-key’s image enhancement and data …
Featured news
Resources
Don't miss
- Cyber crooks got Robinhood to send phishing emails to its own users
- Attackers use MS Teams, fake mailbox repair utility to breach organizations
- The AI criminal mastermind is already hiring on gig platforms
- Indirect prompt injection is taking hold in the wild
- New Cisco firewall malware can only be killed by pulling the plug