Help Net Security
Is your firewall a fire hazard?
Ask a firewall administrator to tidy up a rule base and get rid of every unused rule and object; or if you really want to make someone’s life miserable set them the task …
RSA simplifies use of encryption with new Key Manager Suite
RSA announced enhancements to RSA Key Manager Suite (RKM), its enterprise encryption key management system designed to manage encryption keys at the application, database, and …
Durzosploit: Javascript exploits generator framework
Durzosploit is a javascript exploits generator framework that works through the console. The goal of the project is to quickly and easily generate working exploits for …
Platform-independent voice authentication solution
Convergys Corporation announced a platform-independent On-Demand Voice Authentication solution which can be implemented by enrolling the voice signatures of their customers …
Google Chrome update fixes security issues
Google Chrome has been updated to version 1.0.154.64 to fix two security issues discovered by internal Google testing. CVE-2009-1441: Input validation error in the browser …
iPhone security software: Notes+
Notes+ is rather a simple utility - its main function is to be used as a note taking utility with a twist. The twist in this situation is a security lock which can be turned …
Specialized search engines leading users to malicious websites
PandaLabs has observed how cyber-criminals are starting to use their own search engines to lead users to malicious pages, often created for distributing malware. This new …
Bluetooth proximity lock system
Phoenix Technologies unveiled the Phoenix Freeze, a solution for laptops and netbooks, that provides users with a convenient, always-on Bluetooth proximity system that …
Crime analytics tool
CrimeReports announced the launch of Command Central, a web-based analytics platform that tracks and manages crime data through user-friendly graphs, charts, maps, and …
Secure calls on BlackBerry smartphones
Cellcrypt announced that Cellcrypt Mobile is available now for BlackBerry smartphones. Cellcrypt Mobile introduces end-to-end real-time encryption to prevent private …
Forensically sound Windows bootable environment
ForensicSoft released its newest computer forensic tool, SAFE – the world’s first write-blocked Windows forensic boot environment. SAFE, which stands for System …
Digital health records to increase identity theft?
President Obama has proposed sweeping reform of the nation’s healthcare system and said he believes all medical records should be computerized and standardized within …
Featured news
Resources
Don't miss
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
 - How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI