Help Net Security
Video: How to steal a botnet
Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A …
Desktop virtualization and security survey
Imprivata conducted a national survey targeting executives across a wide array of industries (including healthcare, financial services, state and local governments agencies) …
Oracle releases version 9 of Application Testing Suite
Oracle announced version 9 of the Oracle Application Testing Suite, an integrated solution for load testing, functional testing and test management, enabling customers to …
VLC 1.0.2 fixes security issue
After almost 2 months and 27 million downloads of VLC 1.0.1, VideoLAN released VLC 1.0.2 introduces many fixes, notably for SSA decoding, v4l2, MacOS interface, ogg/theora, …
Cisco IOS Software NTP packet vulnerability
The Network Time Protocol (NTP) is a protocol designed to time-synchronize a network of machines. NTP runs over UDP, which in turn runs over IP. When a Cisco IOS Software …
Book giveaway: Get some free knowledge!
NOTE: The contest is now over, the winners have been notified. This giveaway is made possible by the fine folks at Addison-Wesley Professional and Cisco Press. We are giving …
Complimentary tool for measuring organizations’ breach index
Today breach notification regulations take effect under the HITECH Act. HIPAA-covered entities, including healthcare providers and business associates, are now required to …
Trends transforming IT in 2010
The Burton Group has identified IT trends that will ultimately affect enterprise IT practices and strategy. The trends will also bring business and technology stakeholders …
Companies struggle to protect consumer data
Imperva and the Ponemon Institute announced the findings of a survey across more than 500 U.S. and multinational IT security practitioners showing that, despite the Payment …
INTERPOL’s new secure e-passport initiative
INTERPOL‘s Secretary General Ronald K. Noble announced that the EDAPS Consortium had been chosen to design and produce the world’s largest police …
IEEE ratifies 802.11w to enhance signaling security mechanisms
The IEEE Standards Board has ratified IEEE 802.11w-2009, Standard for Information Technology-Telecommunications and Information Exchange between systems-Local and Metropolitan …
Full-scale audit of the organization that controls Internet policy (ICANN)?
With just over a week left before the expiration of the Joint Project Agreement (JPA) between the Internet Corporation for Assigned Names and Numbers (ICANN) and the …