Cybercriminals shifting focus to non-Windows systems
In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, …
Multiple vulnerabilities in Cisco IOS
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …
Metasploit 3.5.1 adds Cisco device exploitation
Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an …
Learn Cisco networking while playing a game
The Cisco CCENT Mind Share Game is a multimedia PC game that helps users acquire knowledge necessary for success on CCENT and CCNA exams. Featuring more than 75 stages, the …
Cisco estimates huge shift to the cloud by 2013
Nearly 12 percent of enterprise workloads will run in the public cloud by the end of 2013, according to Cisco. Their study found that desktop applications, email, …
Tool finds why specific firewall rules exist in enterprise networks
Athena Security released Firewall Rule Tracker, an asynchronous documentation solution for recording the reason why specific firewall rules exist in enterprise networks. While …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege