Help Net Security
GoTrusted Secure Tunnel raises security for public WiFi hotspot connections
GoTrusted.com announces a new Internet security application for desktops and laptops. Called ‘GoTrusted Secure Tunnel‘ the new application provides one-click …
Integration of Third Brigade IDS/IPS with Intellitactics Security Manager
Third Brigade announced the integration of its product with Intellitactics Security Manager, a comprehensive security information and event management (SIEM) solution. …
Digital signature, authentication and card based encryption for everyone
Wrocklage Intermedia announced its new product Aloaha Smart Card Connector. The Aloaha Smart Card Connector allows applications to use smart card based cryptographic services …
Sophos starts a security blog
Sophos announced the launch of a new security blog designed to provide breaking news, insight and commentary on emerging security threats. The SophosLabs blog, which will be …
Lessons From a Honeynet That Attracted 700,000 Attacks
Over the 5 year lifetime of the IrishHoneynet, we have witnessed hundreds of thousands of scans, probes and attacks against the servers that comprise the network. Our …
Comment on the upcoming Anti-Phishing Group central database
The Anti-Phishing Group (APWG) has announced that a central database that allows organisations around the world to share information about new email phishing scams will be …
The Briz.X Trojan has already stolen the confidential details of 14,000 users
PandaLabs has detected a new variant of the Briz Trojan, called Briz.X, which has already infected almost 14,000 users, stealing all types of information, such as bank and …
Computrace Anti-Theft Security embedded in Toshiba Notebook Computers
Absolute Software announced today that Toshiba America Information Systems has embedded support for Computrace in the BIOS firmware within the Portégé and Tecra models of …
Applied Identity Delivers ID-Unify for Identity Virtualization
Applied Identity announced at Interop 2007 that it is now shipping the initial release of its ID-Unify identity virtualization appliance. ID-Unify reduces the cost and …
Extreme Networks further enhances network security for the wired and wireless edge
Extreme Networks announced that it is providing enterprise customers with integrated network security functionality for its Sentriant security solutions that extends to wired …
Centennial Discovery asset discovery extended to Windows Mobile Devices
Centennial Software announced the support for Windows CE-based devices in its award winning Centennial Discovery solution. The addition of this capability will enable network …
Info on the Check Point Certified Master Architect (CCMA) certification
Check Point announced its most advanced and extensive certification level, empowering IT professionals to validate their extensive security expertise, advance their careers, …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)