Help Net Security
Intel ships enterprise-class solid-state drives
Intel has begun shipping the Intel X-25E Extreme SATA Solid-State Drive (SSD), aimed at server, workstation and storage systems. Unlike mechanical drives, the SSDs contain no …
Iomega Linux-powered secure NAS device
Iomega announced the new StorCenter ix2, a network storage appliance for small businesses and the home. With just four mouse clicks, users can configure up to two terabytes of …
Flash Player update addresses Clickjacking issue
Potential vulnerabilities have been identified in Adobe Flash Player 9.0.124.0 and earlier that could allow an attacker who successfully exploits these potential …
Phishing campaign targeting Facebook aficionados
BitDefender researchers have detected an IM-based spam wave automatically sent to accounts which promises a “hot date” if the Facebook’s users access the …
Protection suite for Linux multi-site cluster
New SteelEye Protection Suite for Linux Multi-Site Cluster is aimed towards Linux users looking to cost-effectively extend existing high-availability capabilities as well as …
Spammers cloak their reputation
A major trend throughout 2008 that intensified during the third quarter is spammers’ increased use of cloaking techniques to hide their poor reputation behind someone …
New book: “Nagios: System and Network Monitoring, 2nd Edition”
The convenience and reliability that monitoring programs offer system administrators is astounding. Whether at home, commuting, or on vacation, admins can continuously monitor …
NVIDIA Tesla supercomputers used for password recovery
ElcomSoft announces the support of the latest generation of NVIDIA Tesla, compact supercomputers based on NVIDIA GPU acceleration technologies, in Elcomsoft Distributed …
Global State of Information Security Survey 2008 findings
Asian companies have made dramatic gains in upgrading their information security efforts, according to the 6th annual Global State of Information Security Survey 2008. The …
Q3 2008 Email Threats Trend Report highlights
 New camouflage tactics spammers use to cloak their bad reputations enable malware and unwanted messages to infiltrate inboxes, according to a new report by Commtouch. …
Organized cybercrime replaces random individual attacks
Targeted and organized, profit-driven attacks are replacing random individual hacker attacks and presenting increased threats for businesses and government, says the …
Data privacy application from SAP and Cisco
SAP and Cisco announced the availability of a composite application that will help organizations proactively enforce data privacy across the business network. The solution is …
Featured news
Resources
Don't miss
- North Korean IT workers are extorting employers, FBI warns
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)