Help Net Security
Citizen data protection in focus: Europe needs a strategy
The European Network and Information Security Agency (ENISA) today launched its Position Paper on security features in European eID schemes. The paper gives the first overview …
Video: RFID wardriving
Ethical hacker Chris Paget demonstrates a low-cost mobile device that surreptitiously reads and clones RFID tags embedded in United States passport cards and enhanced …
Web applications are the Achilles’ heel for corporate IT security
IBM’s annual 2008 X-Force Trend and Risk report found that corporations are unwittingly putting their own customers at risk for cyber-criminal activity. With an alarming …
Manage all privileged passwords with Enterprise Random Password Manager
Lieberman Software announced version 4.7 of Enterprise Random Password Manager, providing improvements in deployment, scalability and compliance for large, multi-site …
EpiForce – Identity-based access control and encryption for mixed networks
Apani launched EpiForce 3.5, the newest version of its single-platform security solution for protecting both virtual and physical networks. EpiForce 3.5 adds identity-based …
Global recession increasing risks to intellectual property
McAfee announced findings from the first global study on the security of information economies. In the study, Unsecured Economies: Protecting Vital Information, security …
Report on the current state of European eID interoperability
The European Network and Information Security Agency (ENISA) presents its first report on the current state of European eID interoperability. Europe has bold ambitions for …
McAfee launches Cybersecurity Expert Council
McAfee announced the launch of its Cybersecurity Expert Council, consisting of information security experts from some of the largest companies around the world. The goal of …
Sniffer Global, a new software-based portable protocol analysis tool
The portable protocol analyzer remains a widely used front-line tool that helps to improve real-time troubleshooting with localized provisional visibility for today’s …
Security experts define new priorities for security standardization
Standardization of security aspects of Information and Communication Technologies (ICT) continues to be a topic that needs careful balance, according the findings of the …
10 Gb intelligent bypass introduced by Interface Masters
Interface Masters Technologies unveiled the Niagara 2812 whose state-of-the-art active bypass capabilities ensure maximum uptime on any network-critical link. During normal …
What the Heartland Data Breach Tells Us
The recent data breach at Heartland Payment Systems should make one thing clear: the standards for security around credit card numbers still aren’t good enough. New …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems