Help Net Security
IronKey unveils 8GB version of secure USB drive
The 8GB model is the latest version in the IronKey product line that currently includes 1GB, 2GB and 4GB options. All user data on an IronKey is encrypted with high-speed …
87 percent of consumers question safety of personal information
Despite placing the security of their personal information as a top priority, many U.S. adults are unwittingly engaging in everyday activities that could put their privacy in …
Spam reaches its 30th anniversary
The first ever spam message was sent on 1st May 1978 by Gary Thuerk, a marketing representative at the Digital Equipment Corporation (DEC), to 393 users of ARPANET. Recent …
Top malware pests in April
At last, there’s been a change in the three malicious programs leading our Online Top Twenty. After two months in first place, the adware program Virtumonde has slipped …
Banks are not doing enough to protect customer data
Last week’s FSA report on Data Security in Financial Fraud criticized UK banks and financial services for failing to effectively identify and mitigate security risks …
New TRENDnet Internet security camera solutions
TRENDnet today announced the launch of the wired and Wireless Day/Night Pan/Tilt Internet Camera Server with 2-Way Audio (models TV-IP422 and TV-IP422W) at the Interop Las …
Fresh Netgear NAS devices
Netgear launched ReadyNAS Pro 1.5TB Gigabit Desktop Storage (RNDP6350), ReadyNAS Pro 3TB Gigabit Desktop Storage (RNDP6310) and ReadyNAS Pro 6TB Gigabit Desktop Storage …
Interview with Josh Corman, Principal Security Strategist for IBM Internet Security Systems
Joshua Corman serves as Principal Security Strategist for IBM Internet Security Systems. With more than ten years of experience in security and networking software …
Comprehensive study of wireless security in Las Vegas
AirDefense unveiled results from its comprehensive study of the wireless airwaves at hundreds of Las Vegas retailers and hotels/casinos. AirDefense found the majority of …
Increasing competition shows huge expectations for NAC market
Network access control (NAC) technologies, a combination of network infrastructure components and security products, are set to become an extension of the network. As common …
Private eyes jailed in industrial espionage spyware case
According to media reports, four members of the Israeli Modi’in Ezrahi private investigation firm have been sentenced after they were found guilty of using a Trojan …
Data integrity and confidentiality at Layer 2
New Soft-MACsec is a modular, portable implementation of the IEEE Std 802.1AE-2006 MACsec standard for network Layer 2 integrity and confidentiality. Soft-MACsec uses a …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised