Help Net Security
Novell Access Manager now with built-in support for WS-Federation
Novell Access Manager 3.1 now offers built-in support for WS-federation, a single sign-on feature typically offered in costly, supplementary federated identity products. …
TRENDnet TEW-673GR: 300Mbps concurrent dual-band wireless N gigabit router
TRENDnet launched the high-performance 300Mbps Concurrent Dual-Band Wireless N Gigabit Router, model TEW-673GR. Built for extreme performance with an Atheros chipset, it …
Q&A: InfoSec World Conference and Expo
Jean Hey serves as Vice President of Conferences for MIS Training Institute. In this capacity she has been responsible for over 100 conferences, many of which focus on …
New CompTIA Network+ certification exam
The Computing Technology Industry Association (CompTIA) announced today the availability of a new CompTIA Network+ exam that reflects the evolution of today’s data and …
Conficker worm variants are infecting thousands of computers
PandaLabs issued an orange alert warning against the malicious Conficker worm, a new family of computer worm that has already infected thousands of computers worldwide. …
IT security spending will increase to match cybercrime threat in 2009
In light of the economic downturn and rising cybercrime attacks as indicated in Finjan’s Web Security Trends Report Q4 2008, Finjan conducted an online survey among 200 …
Huge interest in wireless LAN deployment expansion
AirMagnet released the results of a new research survey that found more than 92 percent of those surveyed plan to extend their WLAN deployments in 2009 despite the current …
Performance management of financial networks with Cronos
ClearSight Networks released Cronos, a vendor-neutral monitoring, analysis, reporting and alerting solution designed to meet the stringent requirements of applications and …
CWE/SANS top 25 most dangerous programming errors
Today in Washington, DC, experts from more than 30 US and international cyber security organizations jointly released the consensus list of the 25 most dangerous programming …
Closer look on the spam URL TLD distribution
ICANN stipulates that all domains must be connected to a registrar, and all applications for domain names must be submitted through a registrar. Today there are hundreds of …
Spammers aren’t finished with Obama just yet
As Inauguration Day approaches, President-elect Obama’s desk is full of important tasks. Among these tasks is the promise he made to his daughters to provide them with a …
Spam stats for January: origins, categories and percentage
Worldwide Internet Mail Gateway Spam Percentage represents the number of messages that were processed and classified as spam versus the total number of messages processed when …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage