Help Net Security
Unified Threat Management: what’s next and why
A recent study by the Aberdeen Group suggests that on average, more than 120 new vulnerability disclosures are made each week, nearly 90% of which could be exploited remotely, …
Cybersecurity programs expected to remain strong under next administration
U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election less than two weeks away, one …
8x more malicious email attachments spammed out in Q3 2008
IT security and control firm Sophos has released the results of its investigation into the latest spam trends and revealed the top twelve spam-relaying countries for the third …
New book: “Mac OS X for Unix Geeks”
In the fourth edition of “Mac OS X for Unix Geeks” the authors updated it for Mac OS X 10.5 and tweaked the book to make it even more interesting than before. By …
USB-based PKI device for strong authentication
VASCO Data Security International unveiled the Digipass Key1, a USB-based PKI solution for strong authentication, digital signature and data protection. Digipass Key1, is the …
Video – memory corruption and buffer overflows
This talk by David Aitel was recorded at the Open Web Application Security Project (OWASP) NYC Conference on Sep 25, 2008. Dave Aitel is CEO and founder of Immunity Inc., and …
Photo safeguards confidential information
These days you can take a photograph with almost every mobile phone. However, using this sort of photo to protect confidential data and send it safely is something new. Ileana …
Extreme Rugged system features Core 2 Duo and GME965 chipset
ADLINK Technology announced availability of the industry’s first Extreme Rugged system based on the Intel Core 2 Duo processor and GME965 chipset. The Ampro by ADLINK …
Lockheed Martin establishes Center for Cyber Security Innovation
Lockheed Martin announced the establishment of its new Center for Cyber Security Innovation (CCSI). The center of excellence represents an evolution for the company and its …
Video: OWASP application security industry outlook panel discussion
Recorded at the Open Web Application Security Project (OWASP) NYC Conference on Sep 24, 2008.
New release of Oracle Adaptive Access Manager
Oracle released OracleAdaptive Access Manager 10g Release 3. Key highlights include: Enhanced Auto Learning — highly advanced statistical evaluation techniques that …
Cyber-Ark updates its Inter-Business Vault
Cyber-Ark Software announced the availability of version 5.0 of the Inter-Business Vault (IBV), its widely-used Managed File Transfer solution that provides both business and …
Featured news
Resources
Don't miss
- North Korean IT workers are extorting employers, FBI warns
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)