Help Net Security
New Deep Security server and application protection software
Third Brigade announced the availability of Third Brigade Deep Security 6, the next generation in server and application protection for dynamic datacenters. It is the first …
Less than six weeks till SCALE 7X
Southern California Linux Expo (SCALE 7x) is one of the conferences we are media sponsoring via our publications. The event starts in just over a month and here is the latest …
Burglar arrested as police post CCTV images on Facebook
Sophos informs us that police in New Zealand have used popular social networking website Facebook to aid their criminal investigations, following the arrest of a 21-year-old …
Network Security Toolkit 1.8.1 has been released
The Network Security Toolkit is a bootable ISO live CD/DVD is based on Fedora 8. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security …
Video: Practitioner’s guide to capturing and analysis of RAM
Embedded below is Dale Beauchamp’s talk “Practitioner’s guide to capturing and analysis of RAM” from January 8th’s DojoSec event.
Security and other factors will dominate outsourcing decisions in 2009
The end-user, the economy, security requirements and the environment will be among the leading factors influencing enterprise clients’ technology outsourcing decisions …
New Cisco Aironet 1140 Series Access Point
Cisco announced the Aironet 1140 Series Access Point, the only dual-radio platform that combines full 802.11n Draft 2.0 performance (up to nine times the throughput of …
Microsoft releases security update
This security update resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Microsoft Server Message Block (SMB) Protocol. The …
Web Security Testing Cookbook
Buying furniture on eBay, selling childhood ZX Spectrum cassette tapes, doing online banking - every service we use is powered by a robust web application. With all the …
Future of Privacy Forum issues recommendations for the new presidential administration
The Future of Privacy Forum (FPF) today proposed seven privacy recommendations to the upcoming administration. FPF Co-chairs Jules Polonetsky and Christopher Wolf applaud …
New phishing attack that infiltrates secure website sessions
Trusteer’s research organization has identified a new phishing attack method designed to trick users into surrendering confidential information after they have logged on …
AVG acquires Sana Software
AVG Technologies announced the acquisition of Sana Security, a developer of identity theft prevention software. Sana’s forward-looking technology in the industry comes …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage