Help Net Security
Networking (2nd Edition)
Computer networking is one of those subjects that is essential to computer professionals working in various fields. While there's a great deal of titles covering networking …
Top 5 information security challenges for US government agencies
Cloakware identified the top five challenges facing federal agencies that expose them to critical security breaches. The list, compiled from in-depth conversations with …
Free smart search-engine for log data
Prism Microsystems unveiled EventTracker PULSE, a smart search-engine for log data that provides system administrators with network-wide insight for optimizing IT performance, …
New version of OSSEC host based IDS
Last week, a new version of OSSEC open source Host-based Intrusion Detection System was released. New 2.0 version is the first one with support for agentless monitoring and …
Google NativeClient Security contest
Do you think it is impossible to safely run untrusted x86 code on the web? Do you want a chance to impress a panel of some of the top security experts in the world? Then …
Video: Hiding Meterpreter with IExpress
This video by Rob Fuller demonstrates how to make running an executable less suspicious for the victim. Driving home the point that one should not run programs that you …
Increased VoIP quality and security with new MPLS offering
MegaPath announced its new Duet with MPLS and Managed Security service, providing high-quality voice combined with data security and performance. It allows customers to …
Central configuration and managing of application privileges
Avecto released Privilege Guard 2.0, which includes full integration with Active Directory Group Policy, enabling central configuration and managing of application privileges …
Innovative iris recognition system from AOptix
AOptix Technologies announced the release of InSight, their iris recognition system. The InSight, which operates at a nominal 2 meter stand-off distance, employs the …
Appliance to reduce WAN costs with secure Internet connections
Blue Coat Systems presented the ProxyAV 210, an appliance for optimizing WAN resources by enabling secure direct Internet connections to branch offices. It eliminates the cost …
VideoPlay adware infections grew 400% in February through malicious use of Web 2.0 pages
PandaLabs detected more than 400% more examples of the adware VideoPlay in February than in January. The main reason for this is the use of popular Web 2.0 sites such as …
Legitimate websites to feel Conficker worm’s impact
Sophos is warning computer users and website administrators to be vigilant this month as the Conficker worm is predicted to hit several legitimate sites, including Texan …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption