•  
  • By Bogdan Botezatu
  • April 26th, 2008
RBA: Computers Identify Their Owners by the Way Users Type

RBA: Computers Identify Their Owners by the Way Users Type

You make too many spelling mistakes and you're banned from your own desktop

  •  
  • By Bogdan Botezatu
  • April 25th, 2008
Sandisk Stuffs Enterprise Networking on a Flash Drive

Sandisk Stuffs Enterprise Networking on a Flash Drive

The company will work with security expert Check Point to deliver a virtualized desktop solution

  •  
  • By Bogdan Botezatu
  • April 23rd, 2008
Keep your Notebook Secure With Yoggie's Gatekeeper Card

Keep your Notebook Secure With Yoggie's Gatekeeper Card

A mini-PC the size of an Express Card

  •  
  • By Bogdan Botezatu
  • April 18th, 2008
MXI Stealth: Take Your Operating System on a Flash Drive

MXI Stealth: Take Your Operating System on a Flash Drive

Users can install and run an operating system directly from the secure flash drive

  •  
  • By Bogdan Botezatu
  • April 8th, 2008
Fingerprints Are So Yesterday: Use the New Vein Scanner to Log In

Fingerprints Are So Yesterday: Use the New Vein Scanner to Log In

The fingerprint biometric security systems can be easily fooled

  •  
  • By Ionut Arghire
  • April 4th, 2008
Distributed Computing to Feature Earthquake Monitoring System

Distributed Computing to Feature Earthquake Monitoring System

UC Riverside researcher aims to make this a reality

  •  
  • By Bogdan Botezatu
  • April 1st, 2008
NXP RFID Encryption Scheme Defeated by University Hackers

NXP RFID Encryption Scheme Defeated by University Hackers

The Mifare Classic family has weak encryption algorithms that have not been updated

  •  
  • By Ionut Arghire
  • March 26th, 2008
Symantec Suspects D-Link Routers for Bot Attack Vulnerability

Symantec Suspects D-Link Routers for Bot Attack Vulnerability

D-Link's devices may be vulnerable to worm or bot attack

  •  
  • By Bogdan Botezatu
  • March 21st, 2008
Cisco Drives Intel-Funded Startup to Ruin

Cisco Drives Intel-Funded Startup to Ruin

Lockdown Networks just locked itself out of the market

  •  
  • By Bogdan Botezatu
  • February 26th, 2008
Trend Micro Signs Buyout Deal With UK Software Encryption Firm

Trend Micro Signs Buyout Deal With UK Software Encryption Firm

Email decryption is a vital step before scanning it for malware

  •  
  • By Bogdan Botezatu
  • February 25th, 2008
Cold-Boot: HDD Encryption Cracking Crash-Course

Cold-Boot: HDD Encryption Cracking Crash-Course

The safest computer is formatted, smashed with an ax and buried in cement

  •  
  • By Bogdan Botezatu
  • February 19th, 2008
British Startup to Offer Self-Destructing Laptops

British Startup to Offer Self-Destructing Laptops

You steal it, you may get a bunch of useless metal and plastic

  •  
  • By Bogdan Botezatu
  • February 14th, 2008
Intel Plans on Shipping Hardware Security-Enabled Chipsets

Intel Plans on Shipping Hardware Security-Enabled Chipsets

Because hardware devices are much more reliable than software applications

  •  
  • By Bogdan Botezatu
  • February 11th, 2008
Toshiba's Portege G910 Gets Atrua Biometric Security Update

Toshiba's Portege G910 Gets Atrua Biometric Security Update

Security at your fingertips

  •  
  • By Bogdan Botezatu
  • February 1st, 2008
The Firestick Pro - Attach Your Firewall to the Keychain

The Firestick Pro - Attach Your Firewall to the Keychain

A hardware firewall the size of an USB stick

  •  
  • By Bogdan Botezatu
  • January 21st, 2008
Sharkoon to Join the RFID Encryption Bandwagon

Sharkoon to Join the RFID Encryption Bandwagon

The company ships a second transponder for the careless users

  •  
  • By Alex Vochin
  • January 15th, 2008
Record Any NSFW Clip You Want Directly from Your Belt Buckle

Record Any NSFW Clip You Want Directly from Your Belt Buckle

With the Buckle DVR from Ajoka

 
Want more? Browse: