Help Net Security
Trend Micro offers enterprise Mac security
Trend Micro Security for Mac 1.5 is designed to protect corporate Mac users against viruses, spyware, blended threats and platform-independent Web-based attacks on the Mac …
BeEF: Browser exploitation framework
BeEF is a browser exploitation framework that demonstrates the collecting of zombie browsers and browser vulnerabilities in real-time. It provides a command and control …
Seagate hard drive with Serial ATA 6Gbit/second technology
Seagate began global shipments of Barracuda XT, a 7200RPM desktop hard drive featuring 2TB of storage capacity and a Serial ATA (SATA) 6Gb/second interface. The 3.5-inch …
Number of domain names reaches 184 million
Domain names continue to show growth across the Internet, according to the second quarter 2009 Domain Name Industry Brief published by VeriSign. The second quarter of 2009 …
Multi-vendor interoperability of iris recognition technology for Homeland Security
Unisys has demonstrated the ability to use multiple iris recognition technologies in a single system, eliminating the need for the Department of Homeland Security and others …
Centralized command and control center appliance for environments with no expertise
Proximex announced Proximex C100, a centralized command and control center appliance. Intended for security environments with little or no IT staff or expertise, it offers a …
UnboundID upgrades Directory Server Platform and LDAP SDK
UnboundID announced version 2.1 of the UnboundID Directory Server and version 1.1 of the UnboundID LDAP SDK for Java. The UnboundID Directory Server is based on a new identity …
Survey: Spam, and what it does to you
SPAMfighter announced the findings of its first quarterly SPAMFighter Community Watch Behavioral Survey, which aims to assess the current attitudes and behaviors towards spam. …
Hacking duo’s trial date set for November
American Chronicle reports that a trial date is set for Thomas Smith and David Edwards, two young men from Texas and South Carolina that allegedly conspired to damage a …
John the Ripper 1.7.3.4 released
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix …
Program to address security threat from network-attached devices
Responding to an often overlooked security risk, ICSA Labs introduced a new program to help enterprises safeguard against intrusions through network-connected devices such as …
Video surveillance system that reasons like a human brain
BRS Labs announced a video-surveillance technology called Behavioral Analytics, which leverages cognitive reasoning, and processes visual data on a level similar to the human …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics