Diamond Cipher hard drive kit
Addonics Technologies announced a hard drive kit with built-in eSATA and USB 2.0 connectors that allows users to easily connect an external SATA hard drive to a system or use …
Secure Hitachi terabyte hard drive
The Deskstar 7K1000.B provides an exceptional blend of power efficiency and performance, making it an ideal solution for power-friendly consumer and commercial PCs. The new …
Malware scenario: Third World War has begun
Sophos is warning of an attempt by hackers to infect computers using the camouflage of a news report claiming that the USA has invaded Iran. Widely spammed out emails with …
Kendall Howard’s new Anti-Theft PC Security Stand
Kendall Howard today announced the launch of its Anti-Theft PC Security Stand, the industry’s most advanced method for keeping PC hardware safe from theft and general …
Washington D.C. workshop on side-channel analysis attacks on embedded devices
Cryptography Research will hold a one-day workshop about how to thwart attacks on embedded devices like mobile communication systems. The workshop is entitled: “An …
Integrated solution secures corporate web applications
WhiteHat Security announced the general availability of an integrated solution with F5 Networks. The new offering allows enterprises to attain expert-level Web application …
Second generation Drobo storage device
Featuring FireWire 800 alongside improved USB 2.0 performance and an upgraded core processor, the new Drobo is the fastest product in its class for managing and storing …
Hacker-friendly wireless router from Netgear
The new Netgear Open Source Wireless-G Router (WGR614L) is a full-featured wireless router designed to serve as a reliable, high-performance platform to support a wide variety …
New high performance UTM appliances
Check Point expanded its UTM-1 Total Security appliance line. The appliances provide a security solution that combines firewall, virtual private network (VPN), intrusion …
Workshop highlights adoption of identity-based encryption
Voltage Security today summarized the results from the recent National Institute of Standards and Technology (NIST) sponsored workshop: Applications of Pairing Based …
Top of the Zombie charts: Verizon, Telecom Italia and Brasil Telecom
Commtouch released its second quarter 2008 Email Threats Trend Report, based on the automated analysis of billions of email messages weekly. The report examines recent trends …
Statistics show that spammers are not giving up
While antispam filters have become more sophisticated in the last year, and spam threats have emerged and dissipated, it is clear that spammers are not giving up the spam …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics