Help Net Security
Google+: The Missing Manual
If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …
IT managers express concerns over tablet security
Cisco commissioned a survey 1500 IT managers and executives in the US, Canada, UK, France, Germany and Spain to assess attitudes, fears and hopes for tablets in the workplace. …
Criminals stole $3.4B from online revenues in 2011
Merchants are making gains against fraud but the battle continues, according to CyberSource, a Visa company. The fraud rate by order (the percentage of orders that turned out …
Security for virtualized and cloud computing
Catbird announced vSecurity 5.0 that integrates directly with the hypervisor to provide automated control, visibility and efficiency. Its vCompliance engine monitors and …
Unique Web malware hosts increase
The proper security tools can prevent infection or stop outbreaks, mitigate or reduce losses from malicious events, and even decrease legal liability. These products can also …
Interactive networking stack debugger
The new P+ 1000 embedded packet debugger provides ability to control and interact with networking designs and is priced for the individual engineer. It offers packet-by-packet …
Network Security First-Step, 2nd Edition
With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively …
Secure collaboration for iPad and iPhone
WatchDox, a provider of secure document access and collaboration solutions, today announced that its users can now securely view and make annotations to documents directly on …
Advanced malware protection with Sourcefire FireAMP
Sourcefire introduced FireAMP advanced malware protection, a malware discovery and analysis solution that analyzes and blocks malware by utilizing big data analytics. Designed …
Tool used in Anonymous Megaupload campaign
Once again, Anonymous is using the low orbit ion canon (LOIC) to DDoS websites. This tool was developed by white hat hackers to stress test websites. Not surprisingly, the …
New Infrastructure as a Service federation platform
6fusion released its next generation UC6 Infrastructure as a Service (IaaS) federation platform. The new version features a completely redesigned web user interface, along …
Low Tech Hacking
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that …