Please turn on your JavaScript for this page to function normally.
Web application security tool extended for checking .NET applications

Fortify Software announced the extension of its Fortify Defender solution for applications written in the .NET language. Fortify Defender’s sophisticated technology …

nCipher payShield used by a leading bank in Croatia

nCipher announced that its payShield hardware security module (HSM) has been deployed at the core of a new telephone and internet banking system in Croatia. Privredna Banka …

2006 – a good year for Cyber-Ark

According to Cyber-Ark, 2006 marked a year of tremendous prosperity and growth in the emerging Privileged Password Management (PPM) market as regulatory compliance, along with …

First EAL4 evaluation to Swedish Common Criteria Scheme

atsec information security AB is performing an EAL4+ evaluation of Tutus Data AB F?¤rist VPN and Firewall for certification by the Swedish Certification Body for IT Security …

Biometrics: What and How

Humans use body characteristics to recognize each other. Some characteristics don’t change over time and some do. What characteristics do we use for identifying people? …

New solution in the secure file storage market

Dekart launched a new software product, Dekart File Move. This application is a real breakthrough in the secure files storage field. Private Disk File Move is designed to …

Malware of the week: Piggi.B worm, ReverseClick.A trojan and VideoCach adware

The Piggi.B worm, the ReverseClick.A Trojan, the VideoCach adware, and the potentially unwanted program (PUP) XPCSpy are the subject of this week’s PandaLabs report. The …

Vulnerability in the IPv6 protocol stack of OpenBSD

CoreLabs discovered that the OpenBSD kernel contains a memory corruption vulnerability in the code that handles IPv6 packets. Exploitation of this vulnerability can result in …

New Trojan variant steals confidential usernames and passwords

A Trojan variant named “Win32.LdPinch.kj’ can steal system usernames and passwords, get confidential data from applications and open a Backdoor in the compromised …

Acquisition supports commitment to market leadership in smart card technology

HID Global manufacturer in the access control industry and part of ASSA ABLOY’s Global Technologies Division, announced that it has acquired Integrated Engineering (IE), …

Break 40-bit Adobe PDF encryption in minutes

ElcomSoft released an Enterprise version of its award-winning Advanced PDF Password Recovery software. This program makes it easy to remove both password encryption and usage …

New fraudulent adware uses rootkit techniques

PandaLabs has detected the appearance of VideoCach, a new adware specimen. This malicious code is designed to fraudulently promote certain security applications. This adware …

Don't miss

Cybersecurity news