TransCore broadens portfolio of RFID technology
TransCore introduces three new RFID transponders, including the Interagency Group (IAG) protocol standard onboard unit, the nationally interoperable eZGo Anywhere onboard unit …
PDFResurrect: PDF analysis and scrubbing utility
PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby …
RBS Worldpay website problems down to lack of code auditing
News that RBS Worldpay’s various web portals are “riddled with holes” according to a hacker have been met with the expected public relations spin that you …
Radware unveils DefensePro 5.0
Radware released DefensePro 5.0, the intrusion prevention system (IPS) which offers a way to guard against vulnerabilities in the network. Leveraging a ‘booster …
New book: “Cloud Computing: Implementation, Management, and Security”
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, …
Apple Xsan 2.2 released
Apple today released version 2.2 of Xsan, its 64-bit cluster file system specifically designed for small and large computing environments. The problem fixed in Xsan 2.2 was …
PhoneCrypt now available for the iPhone
PhoneCrypt is a solution based in military grade encryption (RSA 4096 bits and AES 256 bits). It works in real time, without interfering in the functions of the mobile phone, …
Intrusion prevention for small and medium enterprises
TippingPoint introduced two new intrusion prevention systems designed to secure network traffic for small and medium enterprises. The TippingPoint 110 and TippingPoint 330 …
Enterprise Wi-Fi BlackBerry client
iPass launched Blackberry iPassConnect Client, an enterprise Wi-Fi client. The application works in conjunction with the BlackBerry Enterprise Server, giving IT administrators …
Video: Man busted installing ‘skimming’ device to ATM
Below is CCTV footage form Brazil.
Draft eSecurity code for improved net security
Australia’s Internet Industry Association (IIA) has released a draft eSecurity code to ISPs throughout the continent, to serve as a guide for improving net security. …
Tor for Android mobile devices
TorProxy is an Android application that makes it possible to use Internet sites and services anonymously from a mobile device. This is possible thanks to the Tor network and …
Featured news
Resources
Don't miss
- Want fewer security fires to fight? Start with threat modeling
- Build a mobile hacking rig with a Pixel and Kali NetHunter
- Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains
- Connectwise is rotating code signing certificates. What happened?
- Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)