Secure USB flash drive with on-board PIN pad
The LOK-IT is a USB flash drive with a hardware-based security system that requires users to log in on a self-contained, on-board PIN pad. The PIN pad is not connected to the …
Lansweeper 4.0: Network inventory tracking
Lansweeper 4.0 is a Windows network inventory application that will allow yo to do a complete inventory of your Windows network without the need to install an agent on all …
Government-grade voice security for BlackBerry
Cellcrypt released its high-strength government-grade encryption application for mobile devices, including BlackBerry smartphones, on both T-Mobile’s secure cellular …
nShield Edge: USB-attached hardware security module
Thales released nShield Edge, the world’s first FIPS 140-2 Level 3 validated USB-attached hardware security module (HSM). It features an integrated card reader and …
Changes in new ZeuS variants
The ZeuS/Zbot Trojan variants have been around for a long time. It has come to the point where the name is no longer recognized only by security specialist, but by the general …
Scammers’ link architectures
As much as it hurts us to admit, online scamming shares many of the characteristics of a legal business. Why? Because, in the end, they have the same goal – revenue. To …
Rogue software details: PC-Guide
PC-Guide is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
The evolution of PCI DSS
The Ponemon Institute conducted a research study about the upcoming version of the Payment Card Industry Data Security Standards (PCI DSS), a new set of standards expected to …
ID Vault for iPhone: Single tap login for online accounts
White Sky introduced a secure way to access any online account from the iPhone with its ID Vault for iPhone. ID Vault is the first iPhone app that offers true single-tap …
McAfee unveils new firewall solutions
McAfee released Firewall Enterprise 8. Next generation capabilities include advancements in firewall management, application discovery and protection, and integrated layers of …
Automated penetration testing tools
Codenomicon released a toolkit for automated penetration testing which eliminates unnecessary ad-hoc manual testing. The required expertise is built into the tools making …
Enigma self-encrypted drive
Origin Storage launched the Enigma self-encrypted drive (SED). Incorporating the 256-bit AES hardware encrypted 2.5″ hard drives from Toshiba it provides permanent full …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation