Help Net Security
First iPhone WLAN management application
E(z)RF OnTheGo is the first wireless LAN management application available on a smartphone, has been introduced by Meru Networks for the Apple iPhone. Network administrators …
Kerberos 5 Release 1.7 is now available
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free …
Event-based forensics on wireless LANs
E(z)RF Network Manager 2.0, the first wireless LAN management system to record every client-network wireless protocol interaction, rather than merely gathering aggregate …
Cloud computing security and current market trends
Qualys CEO Philippe Courtot discusses cloud computing security and current market trends.
Gartner survey shows worldwide IT budgets to decline 4.7 percent this year
In the first quarter of 2009, CIOs experienced significant IT budget revisions as executives gained a greater understanding and solidified plans for addressing the global …
Network security strategy from McAfee
McAfee outlined details of its network security strategy which integrates McAfee’s complete network security suite, including network firewalls, intrusion prevention …
East European ATM sniffing down to poor code auditing
Reports that malicious hackers have developed a range of data-sniffing and stealing trojans that have skimmed cardholder data from Eastern European ATMs since the end of 2007 …
FTC shuts down Cutwail botnet but it makes a comeback
The Cutwail botnet, one of the most notorious botnets accounting for up to 35 percent of all spam in May 2009 across the globe, experienced a major blow to its track record …
Apple releases AirPort Utility 5.4.2
AirPort Utility 5.4.2 (DMG download) is the simple to use, setup and management utility for the AirPort Express Base Station, the AirPort Extreme Base Station, and Time …
British communist party website infected by malware
Researchers at Sophos have discovered that the website of the British Communist Party has had malware planted on it by attackers, designed to infect the computers of potential …
MIS Training Institute’s annual information security survey
The MIS Training Institute’s annual information security survey was designed to identify the latest challenges, priorities, investment and management decisions faced by …
(ISC)2 urges focus on workforce development in implementing Obama’s cybersecurity plan
(ISC)2 announced its support of the recommendations to advance the federal cybersecurity workforce as outlined in the report titled, “Cyberspace Policy Review,” …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics