Help Net Security
Vulnerability in SQL Server could allow remote code execution
Microsoft is investigating new public reports of a vulnerability that could allow remote code execution on systems with supported editions of Microsoft SQL Server 2000, …
Check Point to acquire Nokia’s security appliance business
Check Point has signed an agreement to acquire Nokia’s security appliance business. The two businesses have collaborated over the past decade to deliver industry-leading …
Zero-day Web malware blocks surpass yearly average
In its monthly Global Threat Report issued today, ScanSafe, the pioneer and leading provider of SaaS Web Security, reported that the rate of zero-day malware blocks increased …
Linux-Based virtual desktop from IBM and co.
IBM, Virtual Bridges and Canonical announced general availability of a Linux-desktop solution designed to drive significant savings compared with Microsoft-desktop software by …
New password-stealing application disguised as a Firefox plugin
BitDefender Labs detected a new type of password-stealing application disguised as a Mozilla Firefox Plugin. The e-threat, Trojan.PWS.ChromeInject.A, is downloaded to a …
Low power unmanaged switches from Allied Telesis
Allied Telesis announced the low-power versions of the AT-FS705LE and AT-FS708LE, two advanced 10/100TX low power unmanaged switched with 5 and 8 ports respectively. The …
The Rise and Rise of Rogue Security Software
Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts …
Juniper positioned among the leaders of SSL VPN Magic Quadrant
Juniper Networks has been positioned in the “Leaders” quadrant of Gartner’s recently published Magic Quadrant for SSL VPNs.1  The report evaluates vendors …
Malware week: Antivirus360 antivirus and Sinowal.VXR banker trojan
This week’s PandaLabs report includes information about the adware Antivirus360, the Sinowal.VXR banker Trojan and the virus Salit.AN. Antivirus360 is a fake antivirus. …
Microsoft releases Intelligent Application Gateway SP2
Microsoft Whale Communications Intelligent Application Gateway (IAG) 2007 is a remote access gateway that boosts productivity by giving mobile and remote workers, partners and …
Data center transformation a top priority in 2009 for CIOs
New global research reveals that 84 percent of technology organizations are planning to implement a data center transformation (DCT) project in the next 12 months, primarily …
Documenting requirements for RFID data center asset tracking standard
The Financial Services Technology Consortium (FSTC) has published RFID Basic Functional and Numbering Requirements for IT Data Center Assets. Over the last six months, FSTC …
Featured news
Resources
Don't miss
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
- DeepSeek’s popularity exploited by malware peddlers, scammers