Please turn on your JavaScript for this page to function normally.
NASA hacker denied UK trial

Are US authorities treating Gary McKinnon as a scapegoat, while other more serious cybercriminals escape and prove hard to catch? Earlier today, the British Crown Prosecution …

End-to-end protection and auditing for IBM mainframe databases

Imperva introduced SecureSphere Database Gateway for z/OS (DGZ), which monitors local and network activity by users and applications to prevent data loss, fraud, and automate …

Networking security appliances based on the Intel Q35 chipset

Acrosser Technology released the AR-R5700 Series of networking security appliances based upon the Intel Q35 chipset, capable of utilizing the Core2Quad, Core2Duo, and Celeron …

Flash Player update addresses security vulnerabilities

A potential vulnerability has been identified in Adobe Flash Player 10.0.12.36 and earlier that could allow an attacker who successfully exploits this potential vulnerability …

Data protection for mobile devices

Lumension announced it is extending data protection for Windows mobile devices with the introduction of Lumension Mobile, allowing organizations to centrally control and …

How to protect from man-in-the-middle attacks

In light of a new man-in-the-middle type of attack unveiled this week at Black Hat D.C., VeriSign provides simple tips for end users and businesses. The highlighted attack is …

D-Link unveils 802.11n dual-band wireless access point

D-Link is now shipping its latest 802.11n WLAN solution (DAP-2553). The high-speed AP includes integrated 802.3af PoE support, so the device can be mounted where power outlets …

Gmail users hit by phishing chat attack

Gmail users should be on their guard against phishing attacks following news that the email system has been the target of a campaign that spread via the Google Talk instant …

Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB

Amazon Web Services (AWS) is a suite of web services provided by the e-commerce giant, that offers third party developers a way to build on its technology platform. Soon after …

Excel vulnerability puts Macs to risk

Microsoft is investigating new public reports of a vulnerability in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel …

Sync your firewall configurations with Playbook

Matasano Chargen released Playbook 2.0, which makes it easier to manage your network’s firewall rules. It syncs your firewall configurations with a central web-based …

Juniper EX2500 ethernet switch for high-density 10GbE deployments

Juniper Networks announced the expansion of its Ethernet switching product portfolio with the EX2500 line of 10 Gigabit Ethernet (GbE) switch. The EX2500 line will be targeted …

Don't miss

Cybersecurity news