Help Net Security
DoS vulnerability in popular VoIP product
Mu Dynamics discovered and helped remediate a new programming flaw in ReSIProcate: A remotely exploitable Denial of Service vulnerability. The ReSIProcate components, …
Face recognition middleware for embedded systems
Oki Electric Industry announced its launch of a face recognition middleware for the surveillance market. The “FSE (Face Sensing Engine) Ver.4” for embedded systems …
Q&A: Insider Threat
Bob Farber is the CEO of Symark. Prior to joining Symark, Mr. Farber was the Manager of Technical Support Operations for Candle Corporation. In this interview he discusses the …
Comprehensive data flow and VoIP management
Packet Island released an enterprise-lite version of PacketSmart, the proven carrier-class VoIP-Data lifecycle management solution. The PacketSmart Enterprise-Lite Platform …
MultiFactor SecureAuth for Microsoft Office SharePoint Server 2007
MultiFactor Corporation today announced the availability of SecureAuth 4.5 for Microsoft Office SharePoint Server 2007, a secure access solution for enterprise portals. Office …
Mobile surveillance on the iPhone
Lextech Labs introduced iRa, a remote surveillance viewing and control system that puts the power of multiple live video feeds and direct camera pan-tilt-zoom control in the …
Pass the sunscreen and your sensitive data
As the number of vacationers taking their laptops and devices poolside increases, so do the risks to corporate data. These devices often contain confidential corporate …
New automated protection switch boosts router-based network reliability
Cornet Technology announced the availability of its latest intelligent protection switch, the RPS-24, that is targeted at backing up routers in dark or dim sites where …
Juniper Networks operations to be hosted in the new IBM “green” data center
IBM and Juniper Networks announced they have signed a five-year, data center hosting agreement with IBM to support Juniper’s global operations. As part of the …
Diamond Cipher hard drive kit
Addonics Technologies announced a hard drive kit with built-in eSATA and USB 2.0 connectors that allows users to easily connect an external SATA hard drive to a system or use …
The Extended HTML Form Attack Revisited
HTML forms are one of the features in HTTP that allows users to send data to HTTP servers. An often overlooked feature is that due to the nature of HTTP, the web browser has …
Secure Hitachi terabyte hard drive
The Deskstar 7K1000.B provides an exceptional blend of power efficiency and performance, making it an ideal solution for power-friendly consumer and commercial PCs. The new …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits