Mirko Zorz
Nokia focuses on privacy, mobile Web services and security tools
Nokia introduced tools for managing subscriber privacy, mobile Web service interfaces and presence management enabling operators to enhance the service offering for their …
Sony Releases New Fingerprint Identification Unit
Sony’s new fingerprint identification device can serve as the basis for enterprise-wide employee identification solutions in work environments where employee mobility is …
Honeypot Best Practices security conference
The very first security conference ever dedicated to honeypot technologies is starting today in Las Vegas. Key features and benefits of this event: Hear multiple in depth case …
Nokia and Trend Micro establish a strategic alliance
Nokia, and Trend Micro, announced a Memorandum of Understanding to establish a strategic alliance focused on delivering network-based, best-of-breed content security solutions …
Honeypots: Tracking Hackers
Through the book we are presented with a variety of real-life examples. This, along with the numerous references and a CD-ROM packed with whitepapers, source code and data …
Gemplus introduces ResIDent
Gemplus launched ResIDent, a smart card-based ID system designed for advanced e-Government programs. ResIDent enables governments to offer more secure, versatile and …
Security Enhanced Linux BETA Available
A fully functioning distribution of Security Enhanced Linux is now available in BETA for community and industry evaluation. The three-CD set is available here. The shipping …
ActivCard Launches ActivCard Gold 2.2
ActivCard, the leader in IDentity Management software, announced the worldwide availability of ActivCard Gold 2.2 and ActivCard Gold for CAC 2.2, enabling enterprises and U.S. …
Network Associates Fights Spam
The McAfee Security division of Network Associates, Inc. announced a new initiative to combat spam through increased education, awareness, and technology, expanding upon the …
RSA Security collaborates with AMD to boost security
RSA Security Inc. announced they are collaborating with Advanced Micro Devices to deliver optimized encryption software for current AMD Athlon processors and upcoming AMD …
Internet Site Security
This book manages to shade a new light on the problems of security implementation. It's a good idea to give it to both your IT manager and your system administrator, they will …
Interview with Saumil Shah, Security Researcher
Saumil Shah is a security researcher and is one of the authors of Web Hacking: Attacks and Defense. How did you gain interest in computer security? My interest in computer …