Identity and access management trends
Six major trends will drive the evolution of corporate management of identity and access management (IAM) and privacy management in 2012, according to Gartner. “In 2012, …
Apache Shiro: Java security framework
Apache Shiro is a Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s API, you can secure any …
The ABCs of security and compliance
Understanding Security and Compliance is as easy as ABC: Access, Breaches and Changes. At a distance security and compliance share many similarities. As you get into the …
High-performance wireless APs from Aruba Networks
Aruba Networks announced two additions to its portfolio of wireless access points. The Aruba Instant IAP-134 and IAP-135, both 900Mbps 802.11n access points, are designed for …
The Web Application Hacker’s Handbook, 2nd Edition
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise …
The F-BOMB: A tiny $50 spying computer for DARPA
Everyone loves a cheap but effective solution, and DARPA – the US Department of Defense’s agency for developing new military technologies – is no exception. …
Keeping on top of financial malware
A lot of people are apprehensive about buying things and accessing their bank accounts online. It is an understandable fear, especially when one is aware that it takes just a …
Students used keyloggers on school computers, changed grades
Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …
Bogus “browser update” pages deliver malware
Fake “browser update” pages are currently being used to deliver malware and redirect users to survey pages, warns GFI. Their malware researchers have recently …
Mobile security app combines antivirus, web and app protection
McAfee announced a new version of its Mobile Security software, providing smartphone and tablet owners with more controls to preserve their privacy and protection against …
Most disruptive and significant IT trends
451 Research, published an all-encompassing report highlighting the most disruptive and significant trends that the analyst firm expects to dominate and drive the enterprise …
Fingerprint security for Mac OS X
AuthenTec announced a new fingerprint security solution – including an Eikon fingerprint sensor and TrueSuite identity management software – for Mac computers …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform