Please turn on your JavaScript for this page to function normally.
New Deep Security server and application protection software

Third Brigade announced the availability of Third Brigade Deep Security 6, the next generation in server and application protection for dynamic datacenters. It is the first …

Less than six weeks till SCALE 7X

Southern California Linux Expo (SCALE 7x) is one of the conferences we are media sponsoring via our publications. The event starts in just over a month and here is the latest …

Burglar arrested as police post CCTV images on Facebook

Sophos informs us that police in New Zealand have used popular social networking website Facebook to aid their criminal investigations, following the arrest of a 21-year-old …

Network Security Toolkit 1.8.1 has been released

The Network Security Toolkit is a bootable ISO live CD/DVD is based on Fedora 8. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security …

Video: Practitioner’s guide to capturing and analysis of RAM

Embedded below is Dale Beauchamp’s talk “Practitioner’s guide to capturing and analysis of RAM” from January 8th’s DojoSec event.

Security and other factors will dominate outsourcing decisions in 2009

The end-user, the economy, security requirements and the environment will be among the leading factors influencing enterprise clients’ technology outsourcing decisions …

New Cisco Aironet 1140 Series Access Point

Cisco announced the Aironet 1140 Series Access Point, the only dual-radio platform that combines full 802.11n Draft 2.0 performance (up to nine times the throughput of …

Microsoft releases security update

This security update resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Microsoft Server Message Block (SMB) Protocol. The …

Web Security Testing Cookbook

Buying furniture on eBay, selling childhood ZX Spectrum cassette tapes, doing online banking - every service we use is powered by a robust web application. With all the …

Future of Privacy Forum issues recommendations for the new presidential administration

The Future of Privacy Forum (FPF) today proposed seven privacy recommendations to the upcoming administration. FPF Co-chairs Jules Polonetsky and Christopher Wolf applaud …

New phishing attack that infiltrates secure website sessions

Trusteer’s research organization has identified a new phishing attack method designed to trick users into surrendering confidential information after they have logged on …

AVG acquires Sana Software

AVG Technologies announced the acquisition of Sana Security, a developer of identity theft prevention software. Sana’s forward-looking technology in the industry comes …

Don't miss

Cybersecurity news