Video: RFID wardriving
Ethical hacker Chris Paget demonstrates a low-cost mobile device that surreptitiously reads and clones RFID tags embedded in United States passport cards and enhanced …
Web applications are the Achilles’ heel for corporate IT security
IBM’s annual 2008 X-Force Trend and Risk report found that corporations are unwittingly putting their own customers at risk for cyber-criminal activity. With an alarming …
Manage all privileged passwords with Enterprise Random Password Manager
Lieberman Software announced version 4.7 of Enterprise Random Password Manager, providing improvements in deployment, scalability and compliance for large, multi-site …
EpiForce – Identity-based access control and encryption for mixed networks
Apani launched EpiForce 3.5, the newest version of its single-platform security solution for protecting both virtual and physical networks. EpiForce 3.5 adds identity-based …
Global recession increasing risks to intellectual property
McAfee announced findings from the first global study on the security of information economies. In the study, Unsecured Economies: Protecting Vital Information, security …
Report on the current state of European eID interoperability
The European Network and Information Security Agency (ENISA) presents its first report on the current state of European eID interoperability. Europe has bold ambitions for …
McAfee launches Cybersecurity Expert Council
McAfee announced the launch of its Cybersecurity Expert Council, consisting of information security experts from some of the largest companies around the world. The goal of …
Sniffer Global, a new software-based portable protocol analysis tool
The portable protocol analyzer remains a widely used front-line tool that helps to improve real-time troubleshooting with localized provisional visibility for today’s …
Security experts define new priorities for security standardization
Standardization of security aspects of Information and Communication Technologies (ICT) continues to be a topic that needs careful balance, according the findings of the …
10 Gb intelligent bypass introduced by Interface Masters
Interface Masters Technologies unveiled the Niagara 2812 whose state-of-the-art active bypass capabilities ensure maximum uptime on any network-critical link. During normal …
Damn Vulnerable Linux 1.5 is now available
Damn Vulnerable Linux (DVL) is meant to be used by both novice and professional security personnel and is even ideal for the Linux uninitiated. You can start learning IT …
Only 8.4% of email that reached companies in 2008 was non-malicious
PandaLabs revealed the results from its analysis on 430 million email messages from 2008 and discovered that only 8.4 percent of messages that reached companies were …
Featured news
Sponsored
Don't miss
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)
- Review: Action1 – Simple and powerful patch management