Please turn on your JavaScript for this page to function normally.
Perception of data security at odds with reality

Nearly three-quarters of organizations believe they have adequate policies in place to protect sensitive, personal information, yet more than half have lost sensitive data …

Secure USB flash drive with on-board PIN pad

The LOK-IT is a USB flash drive with a hardware-based security system that requires users to log in on a self-contained, on-board PIN pad. The PIN pad is not connected to the …

Lansweeper 4.0: Network inventory tracking

Lansweeper 4.0 is a Windows network inventory application that will allow yo to do a complete inventory of your Windows network without the need to install an agent on all …

Government-grade voice security for BlackBerry

Cellcrypt released its high-strength government-grade encryption application for mobile devices, including BlackBerry smartphones, on both T-Mobile’s secure cellular …

nShield Edge: USB-attached hardware security module

Thales released nShield Edge, the world’s first FIPS 140-2 Level 3 validated USB-attached hardware security module (HSM). It features an integrated card reader and …

Changes in new ZeuS variants

The ZeuS/Zbot Trojan variants have been around for a long time. It has come to the point where the name is no longer recognized only by security specialist, but by the general …

Scammers’ link architectures

As much as it hurts us to admit, online scamming shares many of the characteristics of a legal business. Why? Because, in the end, they have the same goal – revenue. To …

Rogue software details: PC-Guide

PC-Guide is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

The evolution of PCI DSS

The Ponemon Institute conducted a research study about the upcoming version of the Payment Card Industry Data Security Standards (PCI DSS), a new set of standards expected to …

ID Vault for iPhone: Single tap login for online accounts

White Sky introduced a secure way to access any online account from the iPhone with its ID Vault for iPhone. ID Vault is the first iPhone app that offers true single-tap …

McAfee unveils new firewall solutions

McAfee released Firewall Enterprise 8. Next generation capabilities include advancements in firewall management, application discovery and protection, and integrated layers of …

Automated penetration testing tools

Codenomicon released a toolkit for automated penetration testing which eliminates unnecessary ad-hoc manual testing. The required expertise is built into the tools making …

Don't miss

Cybersecurity news