Please turn on your JavaScript for this page to function normally.
New book: “The Twitter Book”

Given the intense media spotlight shining on Twitter right now, chances are if you haven’t twittered yet, you’re probably considering it. So what is Twitter? Why …

Netbook privacy filter from 3M

3M announced a new range of privacy filters specifically designed for the netbook market. New Vikuiti Netbook Filters from 3M, initially available to fit 8.9″ and …

Web application security myths

In the latest episode of the HNS Podcast, Mandeep Khera from Cenzic shares his views on various myths in the field of web application security. To listen to the podcast, click …

First iPhone WLAN management application

E(z)RF OnTheGo is the first wireless LAN management application available on a smartphone, has been introduced by Meru Networks for the Apple iPhone. Network administrators …

Kerberos 5 Release 1.7 is now available

Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free …

Event-based forensics on wireless LANs

E(z)RF Network Manager 2.0, the first wireless LAN management system to record every client-network wireless protocol interaction, rather than merely gathering aggregate …

Cloud computing security and current market trends

Qualys CEO Philippe Courtot discusses cloud computing security and current market trends.

Gartner survey shows worldwide IT budgets to decline 4.7 percent this year

In the first quarter of 2009, CIOs experienced significant IT budget revisions as executives gained a greater understanding and solidified plans for addressing the global …

Network security strategy from McAfee

McAfee outlined details of its network security strategy which integrates McAfee’s complete network security suite, including network firewalls, intrusion prevention …

East European ATM sniffing down to poor code auditing

Reports that malicious hackers have developed a range of data-sniffing and stealing trojans that have skimmed cardholder data from Eastern European ATMs since the end of 2007 …

FTC shuts down Cutwail botnet but it makes a comeback

The Cutwail botnet, one of the most notorious botnets accounting for up to 35 percent of all spam in May 2009 across the globe, experienced a major blow to its track record …

Apple releases AirPort Utility 5.4.2

AirPort Utility 5.4.2 (DMG download) is the simple to use, setup and management utility for the AirPort Express Base Station, the AirPort Extreme Base Station, and Time …

Don't miss

Cybersecurity news