Innovation in secure authentication: Dynamic passwords from printed patterns
PassWindow is an online authentication method. By holding a printed unique key pattern on a transparent plastic card over a screen challenge image, any number of unique visual …
NxTop with support for latest MS desktop and server platforms
Virtual Computer released a new version of NxTop that supports Microsoft’s latest desktop and server platforms. In addition, Virtual Computer has integrated NxTop …
802.11n bonded ADSL2+ gateway from ZyXEL
ZyXEL announced their 802.11n bonded ADSL2+ gateway for operators. The P663HN offers a home networking package with Bonded ADSL2+ modem, 11n Wireless, 4-Port switch and …
New ZoneAlarm Extreme Security with full disk encryption
Check Point announced ZoneAlarm Extreme Security 2010 which introduces ZoneAlarm Hard Drive Encryption. This solution automatically encrypts all hard drive content to protect …
RSA Conference Europe 2009 launches registration grant programme
RSA Conference announced in partnership with Acumin Consulting, the launch of its new Registration Grant Programme for security practitioners who have lost their jobs amid the …
Amazon multi-factor authentication for AWS accounts
An additional layer of protection is now available to protect your AWS account from unauthorized use. Once activated for your AWS account, the new Amazon Multi-Factor …
Microsoft IIS remotely exploitable vulnerability
According to an exploit posting on Milw0rm, there is a serious remotely exploitable vulnerability in the Microsoft’s IIS server. US Cert Vulnerability Note VU#276653 …
Security solution for Craigslist
Craigslist crime schemes steal millions of dollars each year, or worse, lead to violent crime. TrustMe prevents crime through its security solution for Craigslist buyers and …
IBM unveils public desktop cloud
The new IBM Smart Business Desktop on the IBM Cloud subscription service helps clients virtualize desktop computing resources, and provide a logical, rather than a physical, …
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats Call for Papers
The 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10) announced a Call for Papers. Important dates Submissions due: Thursday, February 25, …
Security suite PenTBox 1.0.1 beta released
PenTBox is a security suite with programs like password crackers, Denial of Service testing tools, secure password generators, honeypots and much more. Programmed in Ruby, and …
The lifecycle of Web-based malware
According to the August edition of the MessageLabs Intelligence monthly report, it can be a costly exercise for the bad guys to produce new families of malware in order to …
Featured news
Resources
Don't miss
- NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)
- Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)
- Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO
- LLMs at the edge: Rethinking how IoT devices talk and act
- How to build a secure AI culture without shutting people down