Help Net Security
New book: “Programming Scala”
If you program in Java, you’re spending a lot of effort working for the language. But with Scala, the language works for you. Scala is a modern, multi-paradigm language …
Apple unveils Snow Leopard 10.6.1 update
The 10.6.1 update is recommended for Mac OS X 10.6 Snow Leopard users and includes general operating system fixes that enhance the stability, compatibility, and security of …
Registration opens for cyber war games in NY
With cyber security fraud costing businesses millions worldwide and enforcement agencies facing shortages that can delay forensics investigations for years, the graduate …
Photos from the FRHACK security conference
FRHACK is an international IT security conference that took place this week in France. The photos below are a courtesy of Xavier Mertens. And here are some promotional …
Linux 2.6.31 released
The Linux 2.6.31 kernel adds USB 3.0 support, memory management changes that improve interactivity in desktops, readahead improvements, support for Intel’s Wireless …
Tenable launches hardware and virtual appliance
Tenable Network Security unveiled the Tenable Appliance to expand the deployment options for its security and compliance management software and Nessus vulnerability scanner. …
Companies should examine all security issues
Companies are protecting themselves from high-profile threats such as malware attacks, but leaving themselves vulnerable to a variety of other issues, according to Network …
Western Digital external HDs with hardware-based encryption
WD introduced its new My Book Essential and My Book for Mac desktop external hard drives equipped with the new WD SmartWare software and hardware-based encryption. When the …
MacScan 2.7 is now Snow Leopard compatible
SecureMac released MacScan 2.7, the latest version of its anti-spyware privacy and security software. This new version enhances protection against the latest threats for Mac …
First online hacking conference: SecurityTubeCon
SecurityTubeCon is the first hacker conference to be held completely online, 6-8 November, 2009. The event is aimed at democratizing hacker conferences by allowing any …
Guide to mitigate network security vulnerabilities, threats and cyber attacks
EU Agency ENISA presents the first pan European Good Practice Guide on Network Security Information Exchange (NSIE). The main aim of this guide is to assist Member States and …
(Fake) malware leads to real danger
Well, it seems that we are so used to scares regarding viruses and other assorted malware, that the actual information doesn’t even have to be true anymore but can still …
Featured news
Resources
Don't miss
- How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control