Sunday, June 29th, 2008
Plenty of USB storage keys are on the market, but Ironkey is the first to use military level encryption. Sold in 1GB, 2GB, and 4GB sizes, the key features a processor called the Cryptochip, which uses Public Key Cryptography ciphers linked to an online account to create encryption keys on ...
Posted in Hardware, Networking, Privacy, Security | No Comments
Wednesday, June 25th, 2008
VoIPER is a security toolkit that aims to allow developers and security researchers to easily, extensively and automatically test VoIP devices for security vulnerabilties. It incorporates a fuzzing suite built on the Sulley fuzzing framework, a SIP torturer tool based on RFC 4475 and a variety of auxilliary modules to ...
Posted in Internet, Networking, Privacy, Security | No Comments
Tuesday, June 24th, 2008
Worried about someone breaking into your house in your absence? Or just need to keep a tab on who enters your room while you are away? Well, all you need is a webcam, a linux PC/laptop and a twitter account. And you are set for real time updates through twitter ...
Posted in Hardware, Internet, Linux, Networking, Privacy, Security, Software | No Comments
Monday, June 23rd, 2008
Everyone knows that there's no such thing as 100% security, but it's unlikely that most businesses realize how insecure they really are. New research on endpoint security shows just how vulnerable corporate networks are.
Eighty-one percent of corporate endpoints probed by IT security and control product vendor Sophos failed basic security ...
Posted in Hardware, Internet, Networking, Privacy, Security, Software | No Comments
Monday, June 23rd, 2008
Have you ever needed to PING a host, run trace a Web route, or see what information you're exposing to Internet without having to reconfigure the security on your perimeter devices? Have you tired of having to call your managed security services provider to let them know it's you creating ...
Posted in Internet, Linux, Networking, Privacy, Security, Windows | No Comments