Interactive networking stack debugger
The new P+ 1000 embedded packet debugger provides ability to control and interact with networking designs and is priced for the individual engineer. It offers packet-by-packet …
Network Security First-Step, 2nd Edition
With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively …
Researchers demonstrate tragic state of SCADA security
Since the discovery of Stuxnet, we’ve been hearing from a variety of researchers about security vulnerabilities in SCADA computer systems. While some researchers such as …
Online reputation manager suspected of Illegal code injection
For individuals and companies that have a bad online reputation, online reputation management (ORM) services might sound like a good investment. Such services are not illegal, …
Secure collaboration for iPad and iPhone
WatchDox, a provider of secure document access and collaboration solutions, today announced that its users can now securely view and make annotations to documents directly on …
Advanced malware protection with Sourcefire FireAMP
Sourcefire introduced FireAMP advanced malware protection, a malware discovery and analysis solution that analyzes and blocks malware by utilizing big data analytics. Designed …
Tax-themed spam delivers malware
The US Internal Revenue Service kicked off the 2012 tax filing season on January 4, and malware peddlers haven’t waited much to begin targeting users with tax-themed …
DreamHost hacker accessed pool of unencrypted passwords
DreamHost, one of the world’s most popular and well-known web hosting providers, has sent a warning out to its customers saying that one of their databases containing …
Tool used in Anonymous Megaupload campaign
Once again, Anonymous is using the low orbit ion canon (LOIC) to DDoS websites. This tool was developed by white hat hackers to stress test websites. Not surprisingly, the …
New Infrastructure as a Service federation platform
6fusion released its next generation UC6 Infrastructure as a Service (IaaS) federation platform. The new version features a completely redesigned web user interface, along …
Low Tech Hacking
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that …
Data Privacy Day 2012 is upon us
Coordinated and led by the National Cyber Security Alliance (NCSA), Data Privacy Day on January 28, 2012 will promote the importance of data privacy and encourage digital …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool