Features

Review: Helix 1.9

Review: Helix 1.9

We are fans of open-source software and Helix 1.9 falls into this category. Helix has two components, each with its own set of utilities. The first component is the Windows element, which can be started on a booted Windows system by simply inserting the CD into the drive.
Justin Peltier May 20 2008 1:36PM Security
Review: Forensic Toolkit v2.0

Review: Forensic Toolkit v2.0

Forensic Toolkit (FTK) is one of the most full-featured sets of products. It includes a forensic imager utility, a registry viewer facility and the Distributed Network Attack, which aids password recovery with the password recovery toolkit.
Justin Peltier May 19 2008 3:01PM Security
Software: Safe by design

Software: Safe by design

A new industry alliance promises to pave the way for more secure software. Is SAFECode what we've been waiting for?
Mark Mayne May 16 2008 3:47PM Security
Review: DParaben Device Seizure

Review: DParaben Device Seizure

Paraben has established itself as the market leader in hand-held forensics because its software is easy to use and covers a wide range of devices including PDAs, smartphones, and mobile phones.
Justin Peltier May 16 2008 3:44PM Security
Review: Niksun NetDetector

Review: Niksun NetDetector

Niksun's NetDetector goes way beyond simple network-based forensics. This appliance features not only the ability to do forensics and incident analysis, it also has an intrusion detection system and can do complete network security surveillance.
Peter Stephenson, May 15 2008 2:16PM Security
Interview: Shlomo Kramer, CEO of Imperva

Interview: Shlomo Kramer, CEO of Imperva

The serial company founder and SC's CEO of the Year tells Paul Fisher why he knew all along that data-centric security was the future.
Paul Fisher May 15 2008 11:52AM Security
Mobile phone: productivity super hero, IT security Achilles heel

Mobile phone: productivity super hero, IT security Achilles heel

Smaller than my hand. More intelligent than a mini-computer. Able to detonate bombs from remote locations. Look! It’s a camera. It’s an electronic organiser. It’s the “cell phone”!
Nicholas Miller, CEO, AirPatrol May 14 2008 3:42PM Security
Review: FIRST LOOK: HP Mini-Note 2133, makes my leg feel like it's on fire

Review: FIRST LOOK: HP Mini-Note 2133, makes my leg feel like it's on fire

We're worried about the damn hot operating temperature, but otherwise we're blown away by this mini notebook.
William Maher May 14 2008 2:36PM Hardware
Review: LogRhythm v4.0

Review: LogRhythm v4.0

This is a serious log analysis tool. It covers all the bases you need to cover for network forensics. The appliance contains all the features you would expect in a SIEM solution, plus the ones you need for managing log evidence.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 14 2008 1:35PM Security
Renegade Airwaves: Reclaiming control of the wireless frontier

Renegade Airwaves: Reclaiming control of the wireless frontier

We cannot stop growing identity theft trends by burying our heads in the sand. With the introduction of every innovative technology come new opportunities for cybercriminals to prosper.
Nicholas Miller, CEO, AirPatrol May 12 2008 11:21AM Security
Review: WetStone Technologies LiveDiscover Forensic Edition

Review: WetStone Technologies LiveDiscover Forensic Edition

WetStone's LiveDiscover is an interesting proposition. It is designed as a first step in locating target systems in large networks.
Peter Stephenson, May 12 2008 11:12AM Security
Review: 8e6 PROFESSIONAL EDITION

Review: 8e6 PROFESSIONAL EDITION

This package from 8e6 Technologies offers high flexibility for the large enterprise. The bundle consists of the R3000, the Enterprise Reporter and the Threat Analysis Reporter.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 12 2008 10:57AM Security
Cold comfort

Cold comfort

Researchers have uncovered a number of ways attackers could force a PC to cold boot. Better keep that heating on.
Nick Barron May 9 2008 3:20PM Security
Review: Trend Micro InterScan Web Security Suite

Review: Trend Micro InterScan Web Security Suite

Bringing together some of Trend Micro's features from its larger appliance-based systems, the InterScan Web Security Suite focuses on protecting against malicious web-based threats, along with traditional URL filtering.
Peter Stephenson, May 9 2008 3:18PM Security
Researcher discusses iPod supercomputer

Researcher discusses iPod supercomputer

Microprocessors from portable electronics like iPods could yield low-cost, low-power supercomputers for specialised scientific applications, according to computer scientist John Shalf.
Liz Tay May 9 2008 1:52PM Hardware
Review: Clearswift MIMEsweeper Web Appliance

Review: Clearswift MIMEsweeper Web Appliance

Clearswift's MIMEsweeper appliance takes web content management to the next level. This device is loaded with features way beyond the usual web filter.
Peter Stephenson,CeRNS, May 8 2008 11:59AM Security
Review: St. Bernard iPrism 30h

Review: St. Bernard iPrism 30h

The iPrism appliance is a feature-packed web-content management device that incorporates St Bernard's hybrid technology.
Peter Stephenson, May 8 2008 10:32AM Security
Review: Clearswift MIMEsweeper

Review: Clearswift MIMEsweeper

Clearswift's MIMEsweeper appliance takes web content management to the next level. This device is loaded with features way beyond the usual web filter.
Peter Stephenson, May 8 2008 10:31AM Security
Spintronics professor wins grant, discusses technology

Spintronics professor wins grant, discusses technology

The U.S. Department of Defense has invested half a million dollars in a grant that aims to further the emerging field of quantum spin-based electronics.
Liz Tay May 7 2008 4:38PM Hardware
Is your router rooted?

Is your router rooted?

Could firmware infections during the manufacturing process create backdoors in your network?
Ken Munro May 7 2008 11:27AM Security

Log In

  |  Forgot your password?