Please turn on your JavaScript for this page to function normally.
Info on the Smart Card Alliance Annual Conference 2007

Expanding interest in technologies that can enable fast, secure transactions of all types are driving smart card applications into many market sectors and opening up …

Almost 90% of mail received by companies in August was spam

According to data compiled by TrustLayer Mail, the managed security service from Panda Security, 87.49 percent of email that reached companies in August was spam. This data …

Increasing use of encryption and growing need for centralized automated key management

The greatly increased adoption of the use of encryption is driving the need for centralized and automated key management solutions – this is the finding of a new survey …

Free cross site scripting security scanner

Acunetix today launched a free edition of its popular web vulnerability scanner, which allows companies to check for cross site scripting vulnerabilities in their websites at …

Practical 10 Minutes Security Audit: Oracle Case

This paper will show an extremely simple technique to quickly audit a software product in order to infer how trustworthy and secure it is. It will show you step by step how to …

Exploit auction company WabiSabiLabi speaks out at HITBSecConf2007

Roberto Preatoni, WabiSabiLabi’s Strategic Director (and founder of Zone-H defacement mirror) will hold a presentation entitled “WabiSabiLabi – The Exploit …

Video – how to build a laser espionage microphone

Update (February 2016): Multimedia file removed, as it was using Adobe Flash.

August a dead season for virus epidemics

August once again turned out to be “dead season” for virus epidemics in 2007. Since August 2003, when the Lovesan worm caused the biggest epidemic in history, the …

Log Management in PCI Compliance

Security professionals have come to realize that ensuring data security and integrity is critical to business continuity and risk mitigation. However, with increasing amounts …

Malicious toolbars top the list of most common malware

Panda Security informs that almost 28 percent of computers with installed protection scanned at the Infected or Not website (http://www.infectedornot.com) last week were …

Company wins important ruling for the anti-malware industry

Kaspersky Lab, a leading developer of secure content management solutions, announces that the United States District Court of Washington ruled in favor of Kaspersky Lab, …

Reducing Shoulder-surfing by Using Gaze-based Password Entry

Shoulder-surfing – using direct observation techniques, such as looking over someone’s shoulder, to get passwords, PINs and other sensitive personal information …

Don't miss

Cybersecurity news