The FireEye Malware Protection System (MPS)

/
The FireEye Malware Protection System (MPS) accurately blocks Modern Malware, such as Trojans, bots, crimeware, and advanced persistent threats, in real-time using an advanced multi-phase analysis engine to capture and confirm zero-day malware and targeted attacks. At the core of each security appliance are the FireEye Malware-VM™ and Malware-Callback™ technologies, which combines inbound and outbound filtering to break the malware infection lifecycle.

SANS Security East 2011

/
SANS is proud to be back in the historic French Quarter of New Orleans for SANS Security East 2011 on January 20 - 27 with our top instructors, new course offerings, action-packed night sessions, and many exciting special events.

Trustifier Security Product

/
Starting from the operating system kernel itself, Trustifier security engine can inject itself into all core security layers within an operating system and into applications, where it performs checks on the operations of the applications, system services, user behaviour, device control, network usage, data processing, and more.

Invincea™ Browser Protection enables users to knock out sophisticated Web-borne threats–in real time

/
Invincea™ Browser Protection shields PC users against all types of Web-borne threats by seamlessly moving desktop Web browsers into a controlled virtual environment.

Hackin9 November Issue – Spyware – Someone is always watching…

/
In order to download the magazine you need to sign up to our newsletter. After clicking the “Download” button, you will be asked to provide your email address. You need to verify your email address using the link from the activation email you will receive. If you already subscribed to our list, you will be asked to provide your email address each time you download the magazine. No activation email will be sent and you should see the link for download.

Web Application Security: An Overview

/
Web developers typically do not have any formal training in the area of security and their priorities usually lie elsewhere. Business functionality and meeting tight deadlines are typically the focus areas of developers and security is often forgotten, or at most, an afterthought. This leaves the door wide open for attackers to discover vulnerabilities and exploit them to gain access to sensitive data.

New Stuxnet clues suggest sabotage of Iran’s uranium enrichment program

/
Stuxnet, considered by many security researchers to be the most sophisticated malware ever, targeted Windows PCs that managed large-scale industrial-control systems in manufacturing and utility companies. Those control systems, called SCADA, for "supervisory control and data acquisition," operate everything from power plants and factory machinery to oil pipelines and military installations.

Xbox 360 Kinect controller hacked; use Kinect with a PC

/
A hacker named Hector Martin is the first person to claim a prize of £1,870 for successfully producing drivers for the Kinect controller. These drivers will be continually updated by a growing community. Hector’s drivers are for Linux systems at the moment.

Be Prepared for Cyber Monday…

/
The term “Cyber Monday” refers to the Monday immediately following Black Friday, the ceremonial kick-off of the holiday online shopping season in the United States between Thanksgiving Day and Christmas. Whereas Black Friday is associated with traditional brick-and-mortar stores, "Cyber Monday" symbolizes a busy day for online retailers.

Howard Schmidt, Cybersecurity Coordinator for the White House will be a Keynote Speakers for SC World Congress

/
We are pleased to announce that we have confirmed Howard Schmidt, cybersecurity coordinator for the White House, as one of the keynote speakers for SC World Congress.