Help Net Security
SP2 RC for Windows Server 2008 and Windows Vista
In addition to all previously released updates, Windows Vista SP2 and Windows Server 2008 SP2 will contain changes focused on supporting new types of hardware and adding …
Ethernet server adapter with SSL and IPSec hardware acceleration
Interface Masters Technologies introduced the Niagara 4NE-4TX and 4NE-4SFP, quad port NICs based on Intel’s 82576 Ethernet controller and equipped with Cavium Nitrox …
New book: “Cisco Routers for the Desperate, 2nd Edition”
Cisco routers and switches are the backbone of many small business networks. While Cisco’s hardware is typically reliable, things can break – and when they do, …
BlackBerry asset management, data protection and geolocation tracking
Absolute launched Computrace mobile for the BlackBerry platform, delivering asset management, data protection and geolocation tracking. After Computrace Mobile is installed …
NASA hacker denied UK trial
Are US authorities treating Gary McKinnon as a scapegoat, while other more serious cybercriminals escape and prove hard to catch? Earlier today, the British Crown Prosecution …
End-to-end protection and auditing for IBM mainframe databases
Imperva introduced SecureSphere Database Gateway for z/OS (DGZ), which monitors local and network activity by users and applications to prevent data loss, fraud, and automate …
Networking security appliances based on the Intel Q35 chipset
Acrosser Technology released the AR-R5700 Series of networking security appliances based upon the Intel Q35 chipset, capable of utilizing the Core2Quad, Core2Duo, and Celeron …
Flash Player update addresses security vulnerabilities
A potential vulnerability has been identified in Adobe Flash Player 10.0.12.36 and earlier that could allow an attacker who successfully exploits this potential vulnerability …
Data protection for mobile devices
Lumension announced it is extending data protection for Windows mobile devices with the introduction of Lumension Mobile, allowing organizations to centrally control and …
How to protect from man-in-the-middle attacks
In light of a new man-in-the-middle type of attack unveiled this week at Black Hat D.C., VeriSign provides simple tips for end users and businesses. The highlighted attack is …
D-Link unveils 802.11n dual-band wireless access point
D-Link is now shipping its latest 802.11n WLAN solution (DAP-2553). The high-speed AP includes integrated 802.3af PoE support, so the device can be mounted where power outlets …
Gmail users hit by phishing chat attack
Gmail users should be on their guard against phishing attacks following news that the email system has been the target of a campaign that spread via the Google Talk instant …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics