nShield Edge: USB-attached hardware security module
Thales released nShield Edge, the world’s first FIPS 140-2 Level 3 validated USB-attached hardware security module (HSM). It features an integrated card reader and …
Changes in new ZeuS variants
The ZeuS/Zbot Trojan variants have been around for a long time. It has come to the point where the name is no longer recognized only by security specialist, but by the general …
Scammers’ link architectures
As much as it hurts us to admit, online scamming shares many of the characteristics of a legal business. Why? Because, in the end, they have the same goal – revenue. To …
Rogue software details: PC-Guide
PC-Guide is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
The evolution of PCI DSS
The Ponemon Institute conducted a research study about the upcoming version of the Payment Card Industry Data Security Standards (PCI DSS), a new set of standards expected to …
ID Vault for iPhone: Single tap login for online accounts
White Sky introduced a secure way to access any online account from the iPhone with its ID Vault for iPhone. ID Vault is the first iPhone app that offers true single-tap …
McAfee unveils new firewall solutions
McAfee released Firewall Enterprise 8. Next generation capabilities include advancements in firewall management, application discovery and protection, and integrated layers of …
Automated penetration testing tools
Codenomicon released a toolkit for automated penetration testing which eliminates unnecessary ad-hoc manual testing. The required expertise is built into the tools making …
Enigma self-encrypted drive
Origin Storage launched the Enigma self-encrypted drive (SED). Incorporating the 256-bit AES hardware encrypted 2.5″ hard drives from Toshiba it provides permanent full …
Elcomsoft uses new hardware to speed up password recovery
Elcomsoft announced the support of Tableau TACC1441 hardware to accelerate the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups. The use of a single …
A ZeuS killer? Not really
The “Kill ZeuS” feature of the SpyEye crimeware toolkit is more likely to bring in more money to the ZeuS toolkit makers than to encroach upon their territory. How …
Facebook shows its true face
The F8 conference has ended, and Facebook has started making changes and setting the stage for the announced spread through the entire Internet. They might not put it like …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)