Help Net Security
First ruggedized NAC appliance
Mirage Networks released a ruggedized appliance that is designed for environments where standard equipment cannot be deployed. The new appliance withstands temperature …
Security Power Tools
By reading through security web sites, traversing through software depositories and using Google, you can keep your self updated with the latest tools and attack/defense …
Advanced VFS301 fingerprint sensor
Validity Sensors launched the VFS301 fingerprint sensor. The durable and cost-effective VFS301 fingerprint sensor offers lower power, improved performance, a smaller form …
PCI managed security suite accelerates PCI compliance
Vendor Safe Technologies introduced its new PCI Managed Security Suite, a one-stop solution that enables restaurants and other merchants to comply with the credit card …
Critical security issues in the open source Spring Framework
Ounce Labs Advanced Research Team has documented two vulnerabilities that can affect Java web applications that utilize the Spring Framework. With more than five million …
New secure online backup service
Webroot announced the availability of Webroot Secure Backup, a new data backup solution for home PC users which protects digital photos, music and any other files from damage …
SD memory card for applications where recorded data must be unalterable
SanDisk Corporation introduced the SanDisk SDTM WORM Card, a Write Once Read Many (WORM) digital memory card intended for professional uses such as police investigations, …
Set of tools for data loss prevention
Orchestria FastStart DLP is a new combination of software and services designed to help organizations streamline deployment of a data loss prevention solution. Orchestria …
Phony UPS e-mail delivers a trojan
Panda Security has detected the appearance of a series of emails used to spread the Agent.JEN Trojan. The messages purport to come from the package delivery company UPS.  …
Adware components top list of Threats in June
The top three threats of the month are trojans, two of which are adware components and the third is part of a fake (or rogue) antivirus. In the first place is …
DNS Vulnerability Overview and Suggested Mitigations
On July 9th, 2008 a massive effort was made among software and hardware vendors to release a simultaneous patch to their products. This patch was created to mitigate or …
Cybercrime organizational structures and modus operandi
Finjan announced the latest findings by its Malicious Code Research Center (MCRC). In its latest trends report for Q2 2008, the MCRC identifies and analyzes the latest …
Featured news
Resources
Don't miss
- Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- CISO Assistant: Open-source cybersecurity management and GRC
- Firmware scanning time, cost, and where teams run EMBA
- How AI image tools can be tricked into making political propaganda
- Product showcase: Orbot – Tor VPN for iOS