Berislav Kucan
Wireless Security for Hotspot Users: iPig to the Rescue
Germany based, Windows security and web applications experts at iOpus, just released iPig, a freeware wireless security application. Currently in beta version and therefore …
Using a Blog Service to Minimize Your Exposure to Spammers
Blogs are extremely popular nowdays. I spend most of my non-business related surfing time on blogs. As the number of blogs is increasing every day, I often come across …
China’s Leading Domain Name Registry Service Provider Deploys NFR Security’s Sentivist Solution
ROCKVILLE, MD, July 18, 2005 – NFR Security, Inc., the leader in Real-Time Threat Protectionâ„?, today announced that the China Internet Network Information Center …
O’Reilly Releases “802.11 Wireless Networks: The Definitive Guide, Second Edition”
Farnham, UK–The appeal of wireless networks comes down to two things, according to Matthew Gast: “People move. Networks don’t.” In a world that’s …
Gerhard Eschelbeck on the Common Vulnerability Scoring System (CVSS)
Gerhard Eschelbeck is the CTO & Vice President of engineering of Qualys. In this audio Mr. Eschelbeck discusses the Common Vulnerability Scoring System (CVSS), the …
Qualys CTO on SANS Top 20 Quaterly Update
More than 600 new Internet security vulnerabilities were discovered during the first quarter of 2005, according to the SANS Institute and a team of experts from industry and …
Infosecurity Europe 2005 – First Issue of (IN)SECURE Magazine Available for Download
During the second day of Infosecurity Europe 2005 Conference, HNS announced the first issue of (IN)SECURE Magazine, a freely available, freely distributable digital security …
Infosecurity 2005 – Innovative Method Fuels Business Opportunities
Two weeks ago, Reed Exhibitions held the annual Infosecurity Europe press conference. During the event, hosted in the classy London Millenium Knightsbrdige Hotel, selected …
Data Security Summary of 2004
Mikko Hypponen, Director of Anti-Virus Research at F-Secure, presents HNS visitors with an overview of data security in 2004. The audio concentrates on viruses, worms, …
Scope on Application Vulnerability Description Language
The Application Vulnerability Description Language (AVDL) is a rather new security interoperability standard within the Organization for the Advancement of Structured …
The Fedora – Red Hat False Vulnerability Scam
It looks like the “evil minds” have found a new way to use spam for their devious plans. This time spam is combined with a scam that will try to use social …
Tips on Securing Instant Messaging
According to one of the latest research studies, 92% of all commerical and non-commerical organizations are using instant messaging in the enterprise. Tom Buoniello, VP of …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments