Please turn on your JavaScript for this page to function normally.
Smart card with fully-embedded biometric system

Fidelica Microsystems announced the availability of the company’s FSC-3012 Biometrically Authenticated Smart Card. This biometrically-authenticated credential features a …

Anti-virus vendor acquires Exploit Prevention Labs

Grisoft announced the acquisition of Exploit Prevention Labs, a pioneering developer of safe surfing technology that protects Internet users against malicious web sites and …

Security Predictions for 2008

Saumil Shah is the founder and CEO of Net-Square. In this video, made at Black Hat, he presents an overview on what we can expect in 2008. Saumil bases his assessment on seven …

New contactless smart card reader

RFID specialists ITG announced a partnership with Soliton Systems K.K. Japan. The combined solution includes the OMNIKEY 5321 contactless smart card reader and SmartOn for …

Howard Schmidt on cyber threats to national security

According to a recent MI5 letter to CEOs in the UK, a ‘cyber cold war’ is rapidly developing – with many countries already falling victim to a new type of …

64-bit embedded cryptographic engine RFID device

Atmel’s CryptoRF is the world’s first 13.56 MHz RFID devices with a 64-bit embedded cryptographic engine, mutual authentication capability, and up to 16 …

Data leak prevention solution from Trend Micro

Trend Micro announced Trend Micro LeakProof 3.0, the company’s first data leak prevention solution. The latest version of LeakProof, obtained through the acquisition of …

Security Extensions for Your Joomla! Installation

Joomla! is a free, open source Content Management System that allows you to build websites and other online applications. Because it’s easy to install and simple to …

Amount of malware grew by 100% during 2007

In its 2007 data security summary, F-Secure reports of a steep increase in the amount of new malware detected during 2007. In fact the amount of cumulative malware detections …

Wireless keyboards encryption cracked

Wireless keyboards have been distributed for years all over the globe. After the initial infraded based keyboards, the vendors developed radio frequency based models operating …

Guidance tips for consumers on how to navigate data security breaches

Coalition for Data Security issued its new guide First Do No Harm: How to respond when your consumer data is breached – a practical guide for action when consumers are …

Trojans were the malware that caused most infections in November

According to data gathered by the online antivirus Panda ActiveScan, Trojans (25%) and adware (23%) were the malware that caused most computer infections in November. Worms …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools