Please turn on your JavaScript for this page to function normally.
Removing credit card data seen as key to real security

The consensus of speakers at the just-concluded Real Security Summit is that the future of credit card payments depends on systems that remove useable card data stored …

CryptoMemory prevents cloning and counterfeiting

CryptoMemory devices provide low-cost, secure means of preventing product counterfeiting and/or piracy of Intellectual Property (IP) and OEM parts. CryptoMemory uses a 64-bit …

A closer look at AxCrypt 1.6.3

AxCrypt is one of the best open source file encryption software for Windows. It integrates seamlessly with Windows to encrypt, decrypt, store, send and work with individual …

Who poses the biggest network threat?

Sophos revealed new research into the types of users businesses fear most likely to expose their networks to IT threats. The research shows that 31 percent of companies …

Barracuda Networks and open source intellectual property protection

Barracuda Networks signed a license agreement with the Open Invention Network (OIN) and joined the growing list of companies who are supporting OIN to ensure Linux-based and …

CompTIA survey reveals one-fifth of tech budgets now allocated for security

Spending on security technology, training, assessments, and certification now accounts for one-fifth of total technology budgets, according to research from the Computing …

Microsoft releases four critical security bulletins

Another Patch Tuesday and Microsoft comes out with a variety of patches, and this series is quite serious. The critical vulnerabilities are in: Windows, Outlook Express, …

Two FREE CSI 2007 three-day conference passes for HNS readers

We have a couple of complimentary access passes to the upcoming CSI 2007. The conference will be held November 5-7 in suburban Washington, DC. These full three-day conference …

Forensics edition of Password Recovery Bundle

Russian password experts Elcomsoft recently released Password Recovery Bundle – Forensics Edition. This software suite includes the high-end versions of all of …

New WhiteHat website security statistics report

Web application security experts at WhiteHat released a new Website Security Statistics Report – the aggregate vulnerability data they’ve collected when assessing …

Trojans top the charts in September

Trojans have held off worms and bots to top the charts as the most active type of malicious code, according to data compiled by Panda’s ActiveScan online antivirus …

Nigerian email scammers now using puppies

Sophos has reminded computer users of the danger of email scams following an attempted financial fraud which posed as a communication from a Christian couple offering their …

Don't miss

Cybersecurity news