Help Net Security
Spammers cloak their reputation
A major trend throughout 2008 that intensified during the third quarter is spammers’ increased use of cloaking techniques to hide their poor reputation behind someone …
New book: “Nagios: System and Network Monitoring, 2nd Edition”
The convenience and reliability that monitoring programs offer system administrators is astounding. Whether at home, commuting, or on vacation, admins can continuously monitor …
NVIDIA Tesla supercomputers used for password recovery
ElcomSoft announces the support of the latest generation of NVIDIA Tesla, compact supercomputers based on NVIDIA GPU acceleration technologies, in Elcomsoft Distributed …
Global State of Information Security Survey 2008 findings
Asian companies have made dramatic gains in upgrading their information security efforts, according to the 6th annual Global State of Information Security Survey 2008. The …
Q3 2008 Email Threats Trend Report highlights
 New camouflage tactics spammers use to cloak their bad reputations enable malware and unwanted messages to infiltrate inboxes, according to a new report by Commtouch. …
Organized cybercrime replaces random individual attacks
Targeted and organized, profit-driven attacks are replacing random individual hacker attacks and presenting increased threats for businesses and government, says the …
Data privacy application from SAP and Cisco
SAP and Cisco announced the availability of a composite application that will help organizations proactively enforce data privacy across the business network. The solution is …
New SSL VPN gateway – Connectra NGX R66
Check Point announced Connectra NGX R66, its access gateway that combines SSL VPN, IPSec VPN and intrusion prevention with centralized management. The new release of Connectra …
Updated CompTIA Security+ Exam available October 14
The Computing Technology Industry Association (CompTIA), the leading provider of vendor-neutral certifications for the world’s technology workforce, announced today the …
New book: “iPhone UK: The Missing Manual”
iPhone UK: The Missing Manual, Second Edition (O’Reilly) is the first book about every Apple improvement to its own second edition–the iPhone 3G and iPhone 2.0. …
Check Point’s DynamicID simplifies two-factor authentication
Check Point announced a new authentication technology that leverages mobile devices to increase enterprises’ network security. While other solutions require multiple …
Secure Computing supplies SCADA-specific security signatures
Secure Computing is incorporating three new signature file types for SCADA-specific protocols into its Secure Firewall. SCADA (Supervisory Control and Data Acquisition) …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage