Please turn on your JavaScript for this page to function normally.
Tips for safeguarding your personal assets

It’s only natural for people to be concerned about the safety of their financial assets. Here are a few valuable tips from TrustedID: Monitor your credit history …

Users want fingerprint security in their cell phones

According to a consumer survey, a vast majority of cell phone users (89%) use the device for text messaging and transmitting photos and files. In spite of the privacy of these …

Protection of private files with Folder Castle 4.0

MagneticSoft released Folder Castle 4.0, a major update of the security tool that protects computer files and folders from snoops and thieves. Folder Castle lets the user …

With encrypted Wi-Fi vulnerable everyone is risking their assets

The seventh annual Wireless Security Survey from RSA reveals the continued, dramatic growth of wireless networks in the world’s major financial centres. The survey of …

Unencrypted backup tapes endanger enterprise data protection

Despite high profile cases of unencrypted backup tapes going missing, more than a third of organizations still do not know if they will encrypt their backup tapes and half do …

Unified Threat Management: what’s next and why

A recent study by the Aberdeen Group suggests that on average, more than 120 new vulnerability disclosures are made each week, nearly 90% of which could be exploited remotely, …

Cybersecurity programs expected to remain strong under next administration

U.S. federal government identity and smart card programs have grown significantly under the Bush administration.  But with the election less than two weeks away, one …

8x more malicious email attachments spammed out in Q3 2008

IT security and control firm Sophos has released the results of its investigation into the latest spam trends and revealed the top twelve spam-relaying countries for the third …

New book: “Mac OS X for Unix Geeks”

In the fourth edition of “Mac OS X for Unix Geeks” the authors updated it for Mac OS X 10.5 and tweaked the book to make it even more interesting than before. By …

USB-based PKI device for strong authentication

VASCO Data Security International unveiled the Digipass Key1, a USB-based PKI solution for strong authentication, digital signature and data protection. Digipass Key1, is the …

Video – memory corruption and buffer overflows

This talk by David Aitel was recorded at the Open Web Application Security Project (OWASP) NYC Conference on Sep 25, 2008. Dave Aitel is CEO and founder of Immunity Inc., and …

Photo safeguards confidential information

These days you can take a photograph with almost every mobile phone. However, using this sort of photo to protect confidential data and send it safely is something new. Ileana …

Don't miss

Cybersecurity news