Help Net Security
D-Life security camera system for home surveillance
D-Link announced its easy-to-install, easy-to-use D-Life Web-based home surveillance camera systems are now available channel-wide and have enhanced optics, lower prices and …
New interoperability specification for encryption key management
Brocade, HP, IBM, LSI, RSA, Seagate and Thales announced the creation of a jointly developed specification for enterprise key management that is engineered to dramatically …
Anti-piracy service for iPhone developers
Kali Anti-Piracy is a service for the iPhone developers that protects their applications from being pirated. Evidently, the piracy rate currently is quite high due to the fact …
IEEE approves 1902.1 standard for wireless visibility networks
The IEEE has approved a new wireless standard, IEEE 1902.1, “Standard for Long Wavelength Wireless Network Protocol,” which improves upon the visibility network …
Video: Electronic Driver’s Licence Cloning for $250
This is the video of Chris Paget’s presentation for Shmoocon V, which was held February 6th – 8th 2009 in Washington DC. This talk outlines a number of security …
Congressman twitters secret trip to Iraq
Sophos is warning computer users of the far reaching consequences associated with the irresponsible use of social networking sites like Twitter, following news that a high …
Survey: 92% have security software but how many are aware of the threats?
F-Secure announced results from its annual Online Wellbeing Survey. This third-party survey of Internet users aged 20-40 in the United States, Canada, UK, France, Germany …
First Windows 7 universal IPSec VPN client
NCP engineering has developed the first universal IPSec VPN client for Windows 7. Now available, the beta version of the NCP Secure Entry Client will provide users and IT …
New book: “Network Know-How”
Network Know-How is every computer user’s guide to designing, mapping, and maintaining a trouble-free network. Author and veteran networking consultant John Ross takes …
Study on the celebrity names most frequently used by malicious code
With the Oscars just around the corner, PandaLabs, the malware analysis and detection laboratory, has drawn up a ranking of the celebrity names most frequently used in 2008 by …
Valentine’s Day attracts malicious spam
Spammers are gearing up for Valentine’s Day with an influx of unsolicited advertising, but are also getting in early with a wave of sinister e-mail messages designed to …
Six safety tips to protect yourself from identity fraud
The 2009 Identity Fraud Survey Report by Javelin Strategy & Research offers safety tips for consumers that want to protect themselves from identity fraud. 1. Be Vigilant …
Featured news
Resources
Don't miss
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)