Tool for analyzing and testing security of Flash applications
SWFIntruder is the first tool specifically developed for analyzing and testing security of Flash applications at runtime. It helps to find flaws in Flash applications using …
Study reveals that most americans have false sense of online security
More than half of computer users who think they are protected against online threats like spyware, viruses and hackers actually have inadequate or no online protection, …
Smart card with fully-embedded biometric system
Fidelica Microsystems announced the availability of the company’s FSC-3012 Biometrically Authenticated Smart Card. This biometrically-authenticated credential features a …
Anti-virus vendor acquires Exploit Prevention Labs
Grisoft announced the acquisition of Exploit Prevention Labs, a pioneering developer of safe surfing technology that protects Internet users against malicious web sites and …
New contactless smart card reader
RFID specialists ITG announced a partnership with Soliton Systems K.K. Japan. The combined solution includes the OMNIKEY 5321 contactless smart card reader and SmartOn for …
Howard Schmidt on cyber threats to national security
According to a recent MI5 letter to CEOs in the UK, a ‘cyber cold war’ is rapidly developing – with many countries already falling victim to a new type of …
64-bit embedded cryptographic engine RFID device
Atmel’s CryptoRF is the world’s first 13.56 MHz RFID devices with a 64-bit embedded cryptographic engine, mutual authentication capability, and up to 16 …
Data leak prevention solution from Trend Micro
Trend Micro announced Trend Micro LeakProof 3.0, the company’s first data leak prevention solution. The latest version of LeakProof, obtained through the acquisition of …
Amount of malware grew by 100% during 2007
In its 2007 data security summary, F-Secure reports of a steep increase in the amount of new malware detected during 2007. In fact the amount of cumulative malware detections …
Wireless keyboards encryption cracked
Wireless keyboards have been distributed for years all over the globe. After the initial infraded based keyboards, the vendors developed radio frequency based models operating …
Guidance tips for consumers on how to navigate data security breaches
Coalition for Data Security issued its new guide First Do No Harm: How to respond when your consumer data is breached – a practical guide for action when consumers are …
Trojans were the malware that caused most infections in November
According to data gathered by the online antivirus Panda ActiveScan, Trojans (25%) and adware (23%) were the malware that caused most computer infections in November. Worms …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics