Protect login credentials with key stroke encryption
SutiSoft released SutiKSE, a security solution that protects data being entered on the keyboard. The solution helps protect against keylogging software and malware threats …
Smartphone security and privacy protection
With the rapid adoption of smartphones, concerns about security and privacy of data on the phone are increasing. Consumers realize that they have an extensive amount of …
Free Mac anti-virus for home users
Sophos announced the availability of a free Mac anti-virus product for home users. Based on Sophos’s security software, which protects over 100 million business users …
Bluelog: Bluetooth site survey tool
Bluelog is a Linux Bluetooth scanner written to do a single task, log devices that are in discoverable mode. It is intended to be used as a site survey tool, determining how …
SOURCE Boston and Seattle CFP is now open
SOURCE Conference brings security experts and business professionals together in an intimate and personal environment to discuss the security industry’s most important …
Spying app kicked out of Android Market
Secret SMS Replicator, a spying application that forwards contents of a user’s text messages to the phone of the person who installed it in the first place, has been …
Webroot acquires Prevx
Webroot has acquired Prevx and will integrate Prevx’s technology into its cloud security services. “Webroot and Prevx share a common vision for revolutionizing …
RIAA’s sites downed by Anonymous DDoS attack
Anonymous continues its Operation Payback and has DDoSed two official websites belonging to the Recording Industry Association of America. Riaa.com and riaa.org have been …
Facebook discovers and “punishes” UID-selling developers
The recent discovery that some Facebook application were inadvertently forwarding users’ UIDs to advertising agencies and data collection companies has spurred the …
New DDoS Trojan used for downing dissident sites
A new DDoS Trojan connected with a slew of attacks against Vietnamese blogs has been discovered by SecureWorks. Dubbed Vecebot, the Trojan drops three files into the …
Secure USB drive with Windows Embedded Standard 7
Spyrus released a secure USB flash drive with Windows Embedded Standard 7 pre-installed. Unlike other USB flash drives that run the Windows operating system, the Secure Pocket …
RAID tower with hardware encryption
Addonics announced a family of Cipher Raid Towers with AES 256-bit full disk hardware encryption, a solution for applications that require reliable storage with redundancy and …
Featured news
Resources
Don't miss
- Quantum threats are already active and the defense response remains fragmented
- Top must-visit companies at RSAC 2026
- Oracle issues emergency fix for pre-auth RCE in Identity Manager (CVE-2026-21992)
- Your AI agents are moving sensitive data. Do you know where?
- Plumber: Open-source scanner of GitLab CI/CD pipelines for compliance gaps