Howard Schmidt on cyber threats to national security
According to a recent MI5 letter to CEOs in the UK, a ‘cyber cold war’ is rapidly developing – with many countries already falling victim to a new type of …
64-bit embedded cryptographic engine RFID device
Atmel’s CryptoRF is the world’s first 13.56 MHz RFID devices with a 64-bit embedded cryptographic engine, mutual authentication capability, and up to 16 …
Data leak prevention solution from Trend Micro
Trend Micro announced Trend Micro LeakProof 3.0, the company’s first data leak prevention solution. The latest version of LeakProof, obtained through the acquisition of …
Amount of malware grew by 100% during 2007
In its 2007 data security summary, F-Secure reports of a steep increase in the amount of new malware detected during 2007. In fact the amount of cumulative malware detections …
Wireless keyboards encryption cracked
Wireless keyboards have been distributed for years all over the globe. After the initial infraded based keyboards, the vendors developed radio frequency based models operating …
Guidance tips for consumers on how to navigate data security breaches
Coalition for Data Security issued its new guide First Do No Harm: How to respond when your consumer data is breached – a practical guide for action when consumers are …
Trojans were the malware that caused most infections in November
According to data gathered by the online antivirus Panda ActiveScan, Trojans (25%) and adware (23%) were the malware that caused most computer infections in November. Worms …
New U.S. Patent for network port profiling
Lancope announced that U.S. Patent No. 7,290,283 has been issued for the company’s groundbreaking network port profiling invention, which delivers a more accurate and …
Security issues with MD5 hash values
Researchers Marc Stevens, Arjen Lenstra and Benne de Weger released a paper titled “Vulnerability of software integrity and code signing applications to chosen-prefix …
New version of GFI EndPointSecurity released
GFI Software released a new version of GFI EndPointSecurity, a solution that helps to control the use of portable storage devices – such as iPods, flash drives, USB …
Trojans target Lineage online game players
PandaLabs has detected the appearance of four new variants of the Lineage Trojan over the last two days. These new variants are Lineage.GNH, Lineage.GNE, Lineage.GMT and …
New security book – “The Craft of System Security”
Whether you’re a security practitioner, developer, manager, administrator, or user, this book will give you the deep understanding necessary to meet today’s …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations