Help Net Security
Increasing threat of confidential information loss
A national security and privacy survey sponsored by CA showed that security threats from within an organization now are a bigger problem than attacks from external sources. At …
First ruggedized NAC appliance
Mirage Networks released a ruggedized appliance that is designed for environments where standard equipment cannot be deployed. The new appliance withstands temperature …
Security Power Tools
By reading through security web sites, traversing through software depositories and using Google, you can keep your self updated with the latest tools and attack/defense …
Advanced VFS301 fingerprint sensor
Validity Sensors launched the VFS301 fingerprint sensor. The durable and cost-effective VFS301 fingerprint sensor offers lower power, improved performance, a smaller form …
PCI managed security suite accelerates PCI compliance
Vendor Safe Technologies introduced its new PCI Managed Security Suite, a one-stop solution that enables restaurants and other merchants to comply with the credit card …
Critical security issues in the open source Spring Framework
Ounce Labs Advanced Research Team has documented two vulnerabilities that can affect Java web applications that utilize the Spring Framework. With more than five million …
New secure online backup service
Webroot announced the availability of Webroot Secure Backup, a new data backup solution for home PC users which protects digital photos, music and any other files from damage …
SD memory card for applications where recorded data must be unalterable
SanDisk Corporation introduced the SanDisk SDTM WORM Card, a Write Once Read Many (WORM) digital memory card intended for professional uses such as police investigations, …
Set of tools for data loss prevention
Orchestria FastStart DLP is a new combination of software and services designed to help organizations streamline deployment of a data loss prevention solution. Orchestria …
Phony UPS e-mail delivers a trojan
Panda Security has detected the appearance of a series of emails used to spread the Agent.JEN Trojan. The messages purport to come from the package delivery company UPS.  …
Adware components top list of Threats in June
The top three threats of the month are trojans, two of which are adware components and the third is part of a fake (or rogue) antivirus. In the first place is …
DNS Vulnerability Overview and Suggested Mitigations
On July 9th, 2008 a massive effort was made among software and hardware vendors to release a simultaneous patch to their products. This patch was created to mitigate or …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits