Please turn on your JavaScript for this page to function normally.
Computer forensics tool reveals past online activity

A group of researchers from Stanford University in California and EADS Defence & Security has recently presented a new, open source tool for the forensic analysis of …

Email encryption for iPad and iPhone

Echoworx launched an on-the-device email encryption solution for iOS devices. mobilEncrypt ENDPOINT enables, iPhone and iPad users to send and receive secure, encrypted …

Photos: The look and feel of SecurityByte 2011, part 2

Help Net Security attended this India’s largest information security conference in Bangalore – SecurityByte 2011. The first photo gallery is here. A group photo of …

Multi-layer fraud prevention from IronKey

IronKey introduced the next generation of online banking security: an integrated platform of multiple security controls. This approach reduces the risk of online banking fraud …

SplashID Enterprise: Centralized control of password administration

SplashData announced SplashID Enterprise 2.0, featuring updated Windows and Mac OS X clients, new mobile apps and a web-based application that enable enterprise users to …

Log Management 10 comes with compliance enhancements

Ipswitch announced its log management software solution, WhatsUp Log Management 10 which provides out-of-the-box security and compliance for businesses of all sizes. The …

HTML5-based mobile security platform

AirWatch released an HTML5-based MDM platform. By leveraging HTML5, AirWatch’s management console is now even more accessible from any web-connected device, regardless …

Scammers demand $143 from Windows users, threaten with file deletion

German Windows users are the latest target of some pretty brazen scammers, warns Panda Security. The whole thing starts with a Trojan – likely received via spammy emails …

iPhone 5 “test and keep” spam campaign

As the predictions about the release of iPhone 5 seem all to point to the beginning of October, cyber scammers have decided to add to the frenzy by offering the coveted device …

DigiNotar hacker shares details on GlobalSign breach

Yesterday, GlobalSign announced that it will not be issuing any more certificates until the claims about a breach into its networks made by the “Comodohacker” are …

Cybercriminals impersonating government agencies

GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …

Drupal Author Pane module security bypass weakness

A weakness has been reported in the Author Pane module for Drupal, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …

Don't miss

Cybersecurity news