Please turn on your JavaScript for this page to function normally.
Companies should stop whitelisting their own email domain names

Nearly 20 per cent of all spam now forges the domain name of the recipient – ie looks as though it comes from the recipient, or someone in their company – …

D-Life security camera system for home surveillance

D-Link announced its easy-to-install, easy-to-use D-Life Web-based home surveillance camera systems are now available channel-wide and have enhanced optics, lower prices and …

New interoperability specification for encryption key management

Brocade, HP, IBM, LSI, RSA, Seagate and Thales announced the creation of a jointly developed specification for enterprise key management that is engineered to dramatically …

Anti-piracy service for iPhone developers

Kali Anti-Piracy is a service for the iPhone developers that protects their applications from being pirated. Evidently, the piracy rate currently is quite high due to the fact …

IEEE approves 1902.1 standard for wireless visibility networks

The IEEE has approved a new wireless standard, IEEE 1902.1, “Standard for Long Wavelength Wireless Network Protocol,” which improves upon the visibility network …

Video: Electronic Driver’s Licence Cloning for $250

This is the video of Chris Paget’s presentation for Shmoocon V, which was held February 6th – 8th 2009 in Washington DC. This talk outlines a number of security …

Congressman twitters secret trip to Iraq

Sophos is warning computer users of the far reaching consequences associated with the irresponsible use of social networking sites like Twitter, following news that a high …

Survey: 92% have security software but how many are aware of the threats?

F-Secure announced results from its annual Online Wellbeing Survey. This third-party survey of Internet users aged 20-40 in the United States, Canada, UK, France, Germany …

First Windows 7 universal IPSec VPN client

NCP engineering has developed the first universal IPSec VPN client for Windows 7. Now available, the beta version of the NCP Secure Entry Client will provide users and IT …

New book: “Network Know-How”

Network Know-How is every computer user’s guide to designing, mapping, and maintaining a trouble-free network. Author and veteran networking consultant John Ross takes …

Study on the celebrity names most frequently used by malicious code

With the Oscars just around the corner, PandaLabs, the malware analysis and detection laboratory, has drawn up a ranking of the celebrity names most frequently used in 2008 by …

Valentine’s Day attracts malicious spam

Spammers are gearing up for Valentine’s Day with an influx of unsolicited advertising, but are also getting in early with a wave of sinister e-mail messages designed to …

Don't miss

Cybersecurity news