Help Net Security
NASA hacker denied UK trial
Are US authorities treating Gary McKinnon as a scapegoat, while other more serious cybercriminals escape and prove hard to catch? Earlier today, the British Crown Prosecution …
End-to-end protection and auditing for IBM mainframe databases
Imperva introduced SecureSphere Database Gateway for z/OS (DGZ), which monitors local and network activity by users and applications to prevent data loss, fraud, and automate …
Networking security appliances based on the Intel Q35 chipset
Acrosser Technology released the AR-R5700 Series of networking security appliances based upon the Intel Q35 chipset, capable of utilizing the Core2Quad, Core2Duo, and Celeron …
Flash Player update addresses security vulnerabilities
A potential vulnerability has been identified in Adobe Flash Player 10.0.12.36 and earlier that could allow an attacker who successfully exploits this potential vulnerability …
Data protection for mobile devices
Lumension announced it is extending data protection for Windows mobile devices with the introduction of Lumension Mobile, allowing organizations to centrally control and …
How to protect from man-in-the-middle attacks
In light of a new man-in-the-middle type of attack unveiled this week at Black Hat D.C., VeriSign provides simple tips for end users and businesses. The highlighted attack is …
D-Link unveils 802.11n dual-band wireless access point
D-Link is now shipping its latest 802.11n WLAN solution (DAP-2553). The high-speed AP includes integrated 802.3af PoE support, so the device can be mounted where power outlets …
Gmail users hit by phishing chat attack
Gmail users should be on their guard against phishing attacks following news that the email system has been the target of a campaign that spread via the Google Talk instant …
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Amazon Web Services (AWS) is a suite of web services provided by the e-commerce giant, that offers third party developers a way to build on its technology platform. Soon after …
Excel vulnerability puts Macs to risk
Microsoft is investigating new public reports of a vulnerability in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel …
Sync your firewall configurations with Playbook
Matasano Chargen released Playbook 2.0, which makes it easier to manage your network’s firewall rules. It syncs your firewall configurations with a central web-based …
Juniper EX2500 ethernet switch for high-density 10GbE deployments
Juniper Networks announced the expansion of its Ethernet switching product portfolio with the EX2500 line of 10 Gigabit Ethernet (GbE) switch. The EX2500 line will be targeted …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption