New book: “Network Access Control for Dummies”
Network Access Control for Dummies is a practical guide to understanding and implementing NAC. This latest “For Dummies” reference guide from a leading NAC …
New ReadyNAS 2100 rack-mount system from Netgear
Netgear announced the addition of rack-mount Unified Network Storage appliances and secure remote access to its family of ReadyNAS products. The ReadyNAS 2100 is a …
VoIP Hopper 1.0 released
VoIP Hopper is a security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific Ethernet switches. VoIP Hopper does this by mimicking the behavior …
Desktop ultra-compact network appliance platform
American Portwell Technology announced the CATO-2010, a desktop ultra-compact network appliance platform based on the Intel EP80579 Integrated Processor with Intel QuickAssist …
Threat and spamscape report for May
AppRiver published their monthly report which highlights key spam and malware trends. We heard much less about the Conficker Worm this past month, although, some malware …
Windows 7 anti-piracy experience
Joe Williams, general manager, Worldwide Genuine Windows at Microsoft, outlined what the company has planned for anti-piracy features in Windows 7. The user’s experience …
Web 2.0 hacking incidents on the rise
The Secure Enterprise 2.0 Forum, an industry initiative dedicated to the secure use of social media at work, and WorkLight, a Secure Web 2.0 for Business Company, today …
Login Manager 6.0.1 released
Hitachi ID Systems released version 6.0.1 of the Hitachi ID Login Manager which takes a unique approach to single signon technology. It reduces login time by automatically …
Low-power Core 2 Duo network appliance with six Gigabit LANs
Axiomtek introduced the NA-812A 1U-height network appliance. Designed with green concept in mind, the NA-812A integrates a low power 45nm Intel Core 2 Duo processor up to 1.8 …
US missile launch data on eBay hard drive is a serious lapse in security procedures
Revelations about a hard drive purchased on eBay – which reportedly contained the launch procedures for a US military air defence system – is extremely worrying. …
IBM PR/SM z10 EC/BC evaluated at Common Criteria Certification at EAL 5
atsec information security completed the Common Criteria evaluation of IBM Processor Resource/System Manager (PR/SM) LPAR for IBM System z10 Business Class (z10 BC) and z10 …
Signature-based scanners miss 58% of malware
In its quarterly Global Threat Report issued today, ScanSafe reported that at its highest peak in Q109, 58% of Web malware blocks were zero day threats. On average, the rate …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul