Help Net Security
iSSH: iPhone and iPad SSH client
iSSH is a comprehensive VT100, VT102, VT220, ANSI, xterm, and xterm-color terminal emulator over SSH and telnet, integrated with a tunneled X server and VNC client. iSSH is …
Last chance to get £225 off your RSA Conference Europe registration
RSA Conference Europe 2010 uncovers new threats emerging and how you can contain them. Over three days get the practical knowledge to protect your organization. Choose from …
Hackers: Heroes of the Computer Revolution
This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers—those brilliant and eccentric nerds …
20 ways to lose your database
Arguably an organizations’ most vital asset is its databases, often containing sensitive financial information, customer and employee data and intellectual property. …
The top benefits of virtualization
According to a CDW-G report, 77 percent of agencies are implementing at least one form of virtualization, and of those, 89 percent are benefiting from the technology. Benefits …
Win a copy of “Cyber War” or “Hacking: The Next Generation”
Subscribe to the Help Net Security newsletter and win one of these books: If you win, we will e-mail you on July 19. Our weekly newsletter is packed with information security …
Metasploit training program launched
Rapid7 and SANS will provide comprehensive training to the growing global community of Metasploit Framework users. The Metasploit Framework is an open source project managed …
SSL Labs 1.0.63 comes with improvements
The latest revision of the SSL Labs assessment engine adds several improvements in the area of certificate chains. The engine will now try to download missing intermediate …
Prevent web application abuse
Mykonos Software announced a new release of the Mykonos Security Appliance, aimed at preventing Web application abuse. Targeted at organizations with significant web …
Rogue software details: AV Security Suite
AV Security Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Imperva mitigates insider threats
Imperva announced a File Security product line. SecureSphere File Firewall prevents unauthorized access to unstructured data residing on file servers, network attached storage …
Microsoft closes five vulnerabilities in Windows and Office
In today’s Patch Tuesday, Microsoft delivers four bulletins that close five vulnerabilities in Windows and Office. Wolfgang Kandek, Qualys CTO, comments: …
Featured news
Sponsored
Don't miss
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates