Introduction to malware analysis
In this video, Lenny Zeltser will introduce you to the process of reverse-engineering malicious software. He will outline behavioral and code analysis phases, to make this …
In the security of mobile devices we trust, say users
The majority of mobile device users worldwide feel safe using their mobile devices for applications, including access online banking, according to research by Unisys. The …
GFI LANguard learning videos
GFI LANguard: Software Replacement In this video you see three tips on using GFI LANguard to replace an old piece of software, with a new application. GFI LANguard: Deploy GFI …
Entrust brings strong authentication to mobile devices
With the newest release of Entrust IdentityGuard, Entrust will add the innovative Entrust IdentityGuard Mobile application, which seamlessly authenticates consumer, corporate …
The US continues its reign as the king of spam
The United States continues its reign as the king of spam, relaying more than 13% of global spam, accounting for hundreds of millions of junk messages every day, according to …
New malicious PDF
A new type of malicious PDF file has recently been spotted in the wild. This one contains an malicious object that was embedded into the file through the use of common the …
Poisoned search results: Our daily reality
The biggest threat to search engines are not their competitors, but poisoned search results. Since the moment when search engines have largely become the starting point for …
Perception of data security at odds with reality
Nearly three-quarters of organizations believe they have adequate policies in place to protect sensitive, personal information, yet more than half have lost sensitive data …
Secure USB flash drive with on-board PIN pad
The LOK-IT is a USB flash drive with a hardware-based security system that requires users to log in on a self-contained, on-board PIN pad. The PIN pad is not connected to the …
Lansweeper 4.0: Network inventory tracking
Lansweeper 4.0 is a Windows network inventory application that will allow yo to do a complete inventory of your Windows network without the need to install an agent on all …
Government-grade voice security for BlackBerry
Cellcrypt released its high-strength government-grade encryption application for mobile devices, including BlackBerry smartphones, on both T-Mobile’s secure cellular …
nShield Edge: USB-attached hardware security module
Thales released nShield Edge, the world’s first FIPS 140-2 Level 3 validated USB-attached hardware security module (HSM). It features an integrated card reader and …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground