Please turn on your JavaScript for this page to function normally.
Howard Schmidt on cyber threats to national security

According to a recent MI5 letter to CEOs in the UK, a ‘cyber cold war’ is rapidly developing – with many countries already falling victim to a new type of …

64-bit embedded cryptographic engine RFID device

Atmel’s CryptoRF is the world’s first 13.56 MHz RFID devices with a 64-bit embedded cryptographic engine, mutual authentication capability, and up to 16 …

Data leak prevention solution from Trend Micro

Trend Micro announced Trend Micro LeakProof 3.0, the company’s first data leak prevention solution. The latest version of LeakProof, obtained through the acquisition of …

Amount of malware grew by 100% during 2007

In its 2007 data security summary, F-Secure reports of a steep increase in the amount of new malware detected during 2007. In fact the amount of cumulative malware detections …

Wireless keyboards encryption cracked

Wireless keyboards have been distributed for years all over the globe. After the initial infraded based keyboards, the vendors developed radio frequency based models operating …

Guidance tips for consumers on how to navigate data security breaches

Coalition for Data Security issued its new guide First Do No Harm: How to respond when your consumer data is breached – a practical guide for action when consumers are …

Trojans were the malware that caused most infections in November

According to data gathered by the online antivirus Panda ActiveScan, Trojans (25%) and adware (23%) were the malware that caused most computer infections in November. Worms …

New U.S. Patent for network port profiling

Lancope announced that U.S. Patent No. 7,290,283 has been issued for the company’s groundbreaking network port profiling invention, which delivers a more accurate and …

Security issues with MD5 hash values

Researchers Marc Stevens, Arjen Lenstra and Benne de Weger released a paper titled “Vulnerability of software integrity and code signing applications to chosen-prefix …

New version of GFI EndPointSecurity released

GFI Software released a new version of GFI EndPointSecurity, a solution that helps to control the use of portable storage devices – such as iPods, flash drives, USB …

Trojans target Lineage online game players

PandaLabs has detected the appearance of four new variants of the Lineage Trojan over the last two days. These new variants are Lineage.GNH, Lineage.GNE, Lineage.GMT and …

New security book – “The Craft of System Security”

Whether you’re a security practitioner, developer, manager, administrator, or user, this book will give you the deep understanding necessary to meet today’s …

Don't miss

Cybersecurity news