Protect login credentials with key stroke encryption
SutiSoft released SutiKSE, a security solution that protects data being entered on the keyboard. The solution helps protect against keylogging software and malware threats …
Smartphone security and privacy protection
With the rapid adoption of smartphones, concerns about security and privacy of data on the phone are increasing. Consumers realize that they have an extensive amount of …
Free Mac anti-virus for home users
Sophos announced the availability of a free Mac anti-virus product for home users. Based on Sophos’s security software, which protects over 100 million business users …
Bluelog: Bluetooth site survey tool
Bluelog is a Linux Bluetooth scanner written to do a single task, log devices that are in discoverable mode. It is intended to be used as a site survey tool, determining how …
SOURCE Boston and Seattle CFP is now open
SOURCE Conference brings security experts and business professionals together in an intimate and personal environment to discuss the security industry’s most important …
Spying app kicked out of Android Market
Secret SMS Replicator, a spying application that forwards contents of a user’s text messages to the phone of the person who installed it in the first place, has been …
Webroot acquires Prevx
Webroot has acquired Prevx and will integrate Prevx’s technology into its cloud security services. “Webroot and Prevx share a common vision for revolutionizing …
RIAA’s sites downed by Anonymous DDoS attack
Anonymous continues its Operation Payback and has DDoSed two official websites belonging to the Recording Industry Association of America. Riaa.com and riaa.org have been …
Facebook discovers and “punishes” UID-selling developers
The recent discovery that some Facebook application were inadvertently forwarding users’ UIDs to advertising agencies and data collection companies has spurred the …
New DDoS Trojan used for downing dissident sites
A new DDoS Trojan connected with a slew of attacks against Vietnamese blogs has been discovered by SecureWorks. Dubbed Vecebot, the Trojan drops three files into the …
Secure USB drive with Windows Embedded Standard 7
Spyrus released a secure USB flash drive with Windows Embedded Standard 7 pre-installed. Unlike other USB flash drives that run the Windows operating system, the Secure Pocket …
RAID tower with hardware encryption
Addonics announced a family of Cipher Raid Towers with AES 256-bit full disk hardware encryption, a solution for applications that require reliable storage with redundancy and …
Featured news
Resources
Don't miss
- Social engineering attacks on open source developers are escalating
- Chaos malware expands from routers to Linux cloud servers
- What managing partners should ask AI vendors before signing any contract
- Anthropic’s new AI model finds and exploits zero-days across every major OS and browser
- Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR