Privacy and data protection in the European Union
Mr. Peter Hustinx was one of the high profile speakers at this week’s ENISA NIS ’09 Summer School. In January, he has been reappointed as European Data Protection …
Click fraud surge linked to “Bahama” botnet
Click Forensics announced it has identified an unusually large spike in click fraud traffic coming from a new botnet that appears to be eluding the filters of even the most …
New backbone solution to relieve strain of bandwidth-intensive applications
Alcatel-Lucent introduced a converged IP/Optical backbone network solution designed to relieve the strain on service providers’ core networks caused by the explosive …
Photos: BruCON conference, opening day
BruCON is a brand new security and hacker conference that is taking place right now in Brussels, Belgium. Help Net Security and (IN)SECURE Magazine are proud to be media …
Cell phone data acquisition, analysis & forensics tool
Susteen announced Secure View 2 with svProbe, a forensics solution which enables law enforcement and corporate security consultants to acquire, analyze and report cell phone …
Single sign-on to services and applications in the cloud
Wave Systems announced the launch of id.wave.com, the beta of an identity service that enables strong authentication and single sign-on to Web services and applications in the …
Snort 2.8.5 is now available
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
Google acquires reCAPTCHA
In an entry on the official Google blog, Luis von Ahn, co-founder of reCAPTCHA, and Will Cathcart, Google Product Manager announced that: The acquisition is not about …
Jet-set’s “Facebook” hacked
Ever heard of ASmallWorld? Dubbed “Snobster” by critics, it is an exclusive invitation-only online social network service similar to Friendster. To quote their …
Gigabit speed network encryption appliance
Engage has announced the Black-Door GIG Encryptor, the latest in their line of packet encryption products for both private and public network security. It enables enterprises …
US security policies for IT executives traveling to China
Apparently, the US Government doesn’t want to take any risks. According to CRN and Mark Bregman, CTO at Symantec, they look with suspicion on everything that comes from …
Contactless smart card reader and software development kit from SCM Microsystems
SCM Microsystems announced the SCL3711, a new portable contactless smart card reader capable of supporting multiple contactless applications, from mobile payments to …
Featured news
Resources
Don't miss
- China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)
- The era of the Digital Parasite: Why stealth has replaced ransomware
- Scammers exploit trust in Atlassian Jira to target organizations
- Notepad++ secures update channel in wake of supply chain compromise
- One stolen credential is all it takes to compromise everything