Vodafone’s data security dirty laundry aired in public
Reports that Vodafone’s Australian operation is in the firing line of the country’s Privacy Commissioner, following the apparent placing of billing and call …
Database activity monitoring and vulnerability assessment
Sentrigo released Hedgehog Enterprise 4.1, a fully integrated database activity monitoring and vulnerability assessment solution. Hedgehog DBscanner now conducts checks for …
Secure network access for iPad, iPhone and iPod touch
F5 Networks announced that its BIG-IP Edge Client app and BIG-IP Edge Portal app are now available at the App Store. These apps provide iPad, iPhone, and iPod touch users with …
Managed Wi-Fi access and PCI scanning in a single device
AirTight Networks launched Secure Wi-Fi – a suite of managed services which adds Wi-Fi access. With today’s launch, the company offers hosted, cloud-based, secure …
NSA building one million square-foot data center
The National Security Agency and the U.S. Army Corps of Engineers broke ground on a $1.2 billion data center at Camp W.G. Williams National Guard Post. The massive, one …
Free monitoring tool for Hyper-V environments
HyperV_Mon monitors physical, logical, and virtual performance information that is available when running virtual machines under Microsoft Hyper-V. The graphical display is …
Tuesday is the most active day for threats
The most active day for threat-related traffic worldwide is Tuesday, with Monday a close second, according to a report by SonicWALL. This pattern holds true for the U.S., …
Mono ASP.NET source code disclosure vulnerability
Mono is an open source, cross-platform, implementation of C# and the CLR that is binary compatible with Microsoft.NET. A vulnerability has been reported in Mono, which can be …
Facebook closing on March 15th hoax spreads like wildfire
More than one million Facebook users are believed to have fallen for a hoax claiming that the popular website will close its doors on March 15th. A bogus news story, published …
Fwsnort: Application layer IDS/IPS with iptables
Fwsnort parses the rules files included in the Snort intrusion detection system and builds an equivalent iptables ruleset for as many rules as possible. Fwsnort utilizes the …
Spam moving to social networks and mobile
Following the recent news on global spam levels falling, Jamie Tomasello, Abuse Operations Manager at Cloudmark, outlines her thoughts on why spammers are moving from email to …
Protect USB devices against malicious content
Trend Micro announced the latest version of its USB Security product, designed to protect USB storage devices against malicious content in files that are often transferred by …
Featured news
Resources
Don't miss
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials