Please turn on your JavaScript for this page to function normally.
Video: Compromising electromagnetic emanations of wired keyboards

Martin Vuagnoux and Sylvain Pasini from the Security and Cryptography Laboratory (

The third generation of NAC

McAfee announced the world’s first unified approach to solving the complex Network Access Control (NAC) problem. McAfee’s Unified Secure Access approach links …

Real-time virtualization on Symbian OS

The first product to support Symbian OS on a virtualized mobile platform, VirtualLogix VLX provides new opportunities to original equipment manufacturers (OEMs) and …

Malware found on one of the Adobe websites

At the end of last week SophosLabs discovered that Adobe’s website was linking to a site infected with Mal/Badsrc-C. Digging deeper, they discovered that the infected …

Intel ships enterprise-class solid-state drives

Intel has begun shipping the Intel X-25E Extreme SATA Solid-State Drive (SSD), aimed at server, workstation and storage systems. Unlike mechanical drives, the SSDs contain no …

Iomega Linux-powered secure NAS device

Iomega announced the new StorCenter ix2, a network storage appliance for small businesses and the home. With just four mouse clicks, users can configure up to two terabytes of …

Flash Player update addresses Clickjacking issue

Potential vulnerabilities have been identified in Adobe Flash Player 9.0.124.0 and earlier that could allow an attacker who successfully exploits these potential …

Phishing campaign targeting Facebook aficionados

BitDefender researchers have detected an IM-based spam wave automatically sent to accounts which promises a “hot date” if the Facebook’s users access the …

Protection suite for Linux multi-site cluster

New SteelEye Protection Suite for Linux Multi-Site Cluster is aimed towards Linux users looking to cost-effectively extend existing high-availability capabilities as well as …

Spammers cloak their reputation

A major trend throughout 2008 that intensified during the third quarter is spammers’ increased use of cloaking techniques to hide their poor reputation behind someone …

New book: “Nagios: System and Network Monitoring, 2nd Edition”

The convenience and reliability that monitoring programs offer system administrators is astounding. Whether at home, commuting, or on vacation, admins can continuously monitor …

NVIDIA Tesla supercomputers used for password recovery

ElcomSoft announces the support of the latest generation of NVIDIA Tesla, compact supercomputers based on NVIDIA GPU acceleration technologies, in Elcomsoft Distributed …

Don't miss

Cybersecurity news