The ABCs of security and compliance
Understanding Security and Compliance is as easy as ABC: Access, Breaches and Changes. At a distance security and compliance share many similarities. As you get into the …
High-performance wireless APs from Aruba Networks
Aruba Networks announced two additions to its portfolio of wireless access points. The Aruba Instant IAP-134 and IAP-135, both 900Mbps 802.11n access points, are designed for …
The Web Application Hacker’s Handbook, 2nd Edition
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise …
The F-BOMB: A tiny $50 spying computer for DARPA
Everyone loves a cheap but effective solution, and DARPA – the US Department of Defense’s agency for developing new military technologies – is no exception. …
Keeping on top of financial malware
A lot of people are apprehensive about buying things and accessing their bank accounts online. It is an understandable fear, especially when one is aware that it takes just a …
Students used keyloggers on school computers, changed grades
Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …
Bogus “browser update” pages deliver malware
Fake “browser update” pages are currently being used to deliver malware and redirect users to survey pages, warns GFI. Their malware researchers have recently …
Mobile security app combines antivirus, web and app protection
McAfee announced a new version of its Mobile Security software, providing smartphone and tablet owners with more controls to preserve their privacy and protection against …
Most disruptive and significant IT trends
451 Research, published an all-encompassing report highlighting the most disruptive and significant trends that the analyst firm expects to dominate and drive the enterprise …
Fingerprint security for Mac OS X
AuthenTec announced a new fingerprint security solution – including an Eikon fingerprint sensor and TrueSuite identity management software – for Mac computers …
New data encryption platform
CertiVox unveiled its PrivateSky Secure Information Exchange (SIX) platform. The service provides protection for email, files and other information sent via the cloud, through …
Security analysis tool Trisul 2.3 released
Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains