Please turn on your JavaScript for this page to function normally.
Video: RFID wardriving

Ethical hacker Chris Paget demonstrates a low-cost mobile device that surreptitiously reads and clones RFID tags embedded in United States passport cards and enhanced …

Web applications are the Achilles’ heel for corporate IT security

IBM’s annual 2008 X-Force Trend and Risk report found that corporations are unwittingly putting their own customers at risk for cyber-criminal activity. With an alarming …

Manage all privileged passwords with Enterprise Random Password Manager

Lieberman Software announced version 4.7 of Enterprise Random Password Manager, providing improvements in deployment, scalability and compliance for large, multi-site …

EpiForce – Identity-based access control and encryption for mixed networks

Apani launched EpiForce 3.5, the newest version of its single-platform security solution for protecting both virtual and physical networks. EpiForce 3.5 adds identity-based …

Global recession increasing risks to intellectual property

McAfee announced findings from the first global study on the security of information economies. In the study, Unsecured Economies: Protecting Vital Information, security …

Report on the current state of European eID interoperability

The European Network and Information Security Agency (ENISA) presents its first report on the current state of European eID interoperability. Europe has bold ambitions for …

McAfee launches Cybersecurity Expert Council

McAfee announced the launch of its Cybersecurity Expert Council, consisting of information security experts from some of the largest companies around the world. The goal of …

Sniffer Global, a new software-based portable protocol analysis tool

The portable protocol analyzer remains a widely used front-line tool that helps to improve real-time troubleshooting with localized provisional visibility for today’s …

Security experts define new priorities for security standardization

Standardization of security aspects of Information and Communication Technologies (ICT) continues to be a topic that needs careful balance, according the findings of the …

10 Gb intelligent bypass introduced by Interface Masters

Interface Masters Technologies unveiled the Niagara 2812 whose state-of-the-art active bypass capabilities ensure maximum uptime on any network-critical link. During normal …

Damn Vulnerable Linux 1.5 is now available

Damn Vulnerable Linux (DVL) is meant to be used by both novice and professional security personnel and is even ideal for the Linux uninitiated. You can start learning IT …

Only 8.4% of email that reached companies in 2008 was non-malicious

PandaLabs revealed the results from its analysis on 430 million email messages from 2008 and discovered that only 8.4 percent of messages that reached companies were …

Don't miss

Cybersecurity news