Help Net Security
Automated penetration testing tools
Codenomicon released a toolkit for automated penetration testing which eliminates unnecessary ad-hoc manual testing. The required expertise is built into the tools making …
Enigma self-encrypted drive
Origin Storage launched the Enigma self-encrypted drive (SED). Incorporating the 256-bit AES hardware encrypted 2.5″ hard drives from Toshiba it provides permanent full …
Elcomsoft uses new hardware to speed up password recovery
Elcomsoft announced the support of Tableau TACC1441 hardware to accelerate the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups. The use of a single …
Tenable releases SecurityCenter 4
Tenable released SecurityCenter 4, the enterprise-class management console for Tenable’s Unified Security Monitoring suite of products. By centralizing system and event …
Snort 2.8.6 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
Insecure web applications greatest data threat
Most businesses, despite having numerous mission-critical applications accessible via their websites, fail to allocate sufficient financial and technical resources to secure …
Plenty of credit card fraud and identity theft
A survey of 1000 commuters in London has found that a tidal wave of credit card fraud and Identity theft is sweeping the UK as 44 % of people said they have suffered from …
Netgear ProSafe Quad WAN Gigabit SSL VPN Firewall
Netgear announced the ProSafe Quad WAN Gigabit SSL VPN Firewall (SRX5308), the first business firewall to provide in excess of 1 Gbps performance for under $500, which …
Organizations resist automated IT security processes
Organizations are investing to improve their security processes, but very few have automated their compliance procedures. This is one of the findings of a research report by …
Week in review: Facebook credentials for sale, Fake AV issues and rising security threats
Here’s an overview of some of last week’s most interesting news, reviews and podcasts: OWASP releases list of top 10 web application risks OWASP has released an …
VLC media player 1.0.6 fixes several vulnerabilities
The VLC development team introduced a new version of its ‘Goldeneye’ branch. This release bridges the gap between version 1.0.5 and the upcoming 1.1.0 VLC release. …
SplashID for iPhone introduces finger pattern login
SplashID 5.3 includes a unique new pattern-based option for accessing a user’s secure database of passwords, web logins, account numbers, PINs, and other sensitive …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy