Help Net Security
Second generation Drobo storage device
Featuring FireWire 800 alongside improved USB 2.0 performance and an upgraded core processor, the new Drobo is the fastest product in its class for managing and storing …
Network Warrior
The Cisco CCNA network associate certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including …
Hacker-friendly wireless router from Netgear
The new Netgear Open Source Wireless-G Router (WGR614L) is a full-featured wireless router designed to serve as a reliable, high-performance platform to support a wide variety …
New high performance UTM appliances
Check Point expanded its UTM-1 Total Security appliance line. The appliances provide a security solution that combines firewall, virtual private network (VPN), intrusion …
Workshop highlights adoption of identity-based encryption
Voltage Security today summarized the results from the recent National Institute of Standards and Technology (NIST) sponsored workshop: Applications of Pairing Based …
Top of the Zombie charts: Verizon, Telecom Italia and Brasil Telecom
Commtouch released its second quarter 2008 Email Threats Trend Report, based on the automated analysis of billions of email messages weekly. The report examines recent trends …
Statistics show that spammers are not giving up
While antispam filters have become more sophisticated in the last year, and spam threats have emerged and dissipated, it is clear that spammers are not giving up the spam …
Hacked personal email accounts used for personalized 419 scam
At first glance, the email below looks like a typical 419 scam: The twist is that the email came from a user’s hacked webmail account and was sent to his personal list …
Encryption key management for Oracle Database 11g
nCipher announced its nShield and netHSM key management solutions are now integrated with Transparent Data Encryption, part of Oracle Database 11g Advanced Security option. …
New malware dominated by Trojans
Panda Security announced the findings from its second quarterly report of 2008 which revealed that Trojans comprised over 63 percent of all new malicious codes. Adware …
Q&A: Software-as-a-Service and Threat Management
Misha Govshteyn is the CTO and responsible for security strategy, security research and operations at Alert Logic. In this interview he discusses Software-as-a-Service (SaaS), …
Cybercriminals reinvent methods of malicious attacks
Cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly ensnare both consumers and …
Featured news
Sponsored
Don't miss
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)