Shinken: IT system and application monitoring
Shinken can monitor all IT from systems to end user applications. In case of a failure, it can alert the operation engineers so they can repair it. It has the same …
Fingerprint sensors for mobile ID devices
DigitalPersona launched a new generation of biometric fingerprint sensors designed specifically for the growing market of battery-powered mobile identification devices. The …
WatchGuard unveils new line of virtualized firewalls
WatchGuard is extending its line of UTM appliances to the virtual world. Designed for a VMware hypervisor environment, the new WatchGuard XTMv series of virtual firewalls …
Twitter protects freedom of speech and privacy of users
When LulzSec member Sabu recently answered a lot of questions on an impromptu Q&A session on Reddit by posting the answers on his Twitter account, he was asked why he …
Hardened Android kernel to be used by U.S. Army, government
The U.S. government is looking at replacing radio communication between federal, state and local law enforcement and response agencies with communication with smartphones, and …
Free Metasploit Community Edition released
Rapid7 launched Metasploit Community Edition: a new free addition to the Metasploit family of software solutions, which help security and IT professionals identify and …
Information theft still a serious threat to global business
Fraud remains predominantly an inside job, according to the Kroll Annual Global Fraud Report. The study shows that 60 percent of frauds are committed by insiders, up from 55 …
Beware of bogus Gmail Hacker software
Hacking into someone’s mail account can be easy if the person chose an easily guessable password, but could be nigh impossible to brute force it if it’s long and …
Huge threats still targeting power grids
One year ago, the Stuxnet virus had just been discovered. A year’s worth of analysis still has not unlocked its secrets but it has had a profound influence upon the …
IT execs view security and privacy as top priority
New and complex IT risks and changing business priorities challenge today’s IT leaders, according to a new survey from Protiviti. The results of the study reveal six …
Password misuse at root of hacking
48 percent of IT security professionals surveyed have worked for organizations whose network has been breached by a hacker, according to Lieberman Software. The survey paints …
Enterprise IT spending to reach $2.7 trillion in 2012
Worldwide enterprise IT spending is projected to total $2.7 trillion in 2012, a 3.9 percent increase from 2011 spending of $2.6 trillion, according to Gartner. While …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation