Lockheed Martin develops early warning for maritime security
Lockheed Martin has developed the Suspicion Vessel Focuser (SVF) – a novel software technology that allows naval watchstanders to monitor large numbers of ships and …
The impact of identity theft in California
A comprehensive study exploring the identity theft crisis in California was released today by Identity Theft 911. In addition to detailing the increasing diversity of …
Mobile phone with fingerprint biometrics
Lenovo Mobile selected Atrua’s made-for-mobile fingerprint solution for Lenovo’s P960 mobile phone – Lenovo’s first commercial mobile phone to …
Wireless and wired devices in hazardous environments
Digi International introduced a line of wired and wireless device networking solutions designed for reliable operation in hazardous environments. The product line includes the …
High-end cameras for professional security and surveillance
D-Link introduced three high-end fixed network cameras designed for professional surveillance and security applications, providing powerful and versatile security solutions …
Blended threats increase as malicious content grows more enterprising
Secure Computing published the company’s Q2 Internet Threat Report containing data and analysis from the Secure Computing research team. Among other findings, the report …
New book: “No Root for You”
Over the years, Gordon L. Johnson has realized the information available for non-experts concerning network auditing is rather scarce. His new book, “No Root for …
Video: Surf Jacking Gmail demonstration
Below is a demonstration by Sandro Gauci of the Surf Jack attack being performed on Gmail. It also shows how Google’s Gmail can be prevented from being vulnerable to …
Configuration auditing packages for retail and PCI
nCircle released new configuration auditing and file integrity monitoring options designed for the retail sector and businesses subject to PCI. The packages provide two new …
Malware week in review: social networking and hot chick video worms
This week’s PandaLabs report looks at the Boface.A worm, and the Nabload.DIK TR and Exchanger.T Trojans. Boface.A spreads through social networks (MySpace and Facebook) …
CNN news spam with fake Flash update malware
There is a massive spam session running around with fake e-mails trying to spoof CNN news web site in order to make unsuspecting users download a malware file …
New facebook malware attack uses false video in wall posts
Sophos is warning users of Facebook to exercise caution when clicking on links in wall posts, following an attempt by hackers to infect computers by spreading messages …
Featured news
Resources
Don't miss
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps