IronKey USB key has military grade encryption

Sunday, June 29th, 2008

Plenty of USB storage keys are on the market, but Ironkey is the first to use military level encryption. Sold in 1GB, 2GB, and 4GB sizes, the key features a processor called the Cryptochip, which uses Public Key Cryptography ciphers linked to an online account to create encryption keys on ...

VoIPER 0.06 released

Wednesday, June 25th, 2008

VoIPER is a security toolkit that aims to allow developers and security researchers to easily, extensively and automatically test VoIP devices for security vulnerabilties. It incorporates a fuzzing suite built on the Sulley fuzzing framework, a SIP torturer tool based on RFC 4475 and a variety of auxilliary modules to ...

Keep Tab On Home Security With A Webcam And Twitter

Tuesday, June 24th, 2008

Worried about someone breaking into your house in your absence? Or just need to keep a tab on who enters your room while you are away? Well, all you need is a webcam, a linux PC/laptop and a twitter account. And you are set for real time updates through twitter ...

Endpoint security holes an open door for attackers

Monday, June 23rd, 2008

Everyone knows that there's no such thing as 100% security, but it's unlikely that most businesses realize how insecure they really are. New research on endpoint security shows just how vulnerable corporate networks are. Eighty-one percent of corporate endpoints probed by IT security and control product vendor Sophos failed basic security ...

Best Security Tools: Free online Web utilities

Monday, June 23rd, 2008

Have you ever needed to PING a host, run trace a Web route, or see what information you're exposing to Internet without having to reconfigure the security on your perimeter devices? Have you tired of having to call your managed security services provider to let them know it's you creating ...