TweetGrade: online user reputation on Twitter
Purewire launched TweetGrade, which provides a quantitative assessment of a user’s reach and influence in the Twitter community, and it helps people understand a …
DeviceAnywhere introduces Palm Pre to its developer network
DeviceAnywhere added the new Palm Pre phone to its network of 2000+ feature phones and smartphones available over the DeviceAnywhere platform and accessible by organizations …
New book: “The Twitter Book”
Given the intense media spotlight shining on Twitter right now, chances are if you haven’t twittered yet, you’re probably considering it. So what is Twitter? Why …
Netbook privacy filter from 3M
3M announced a new range of privacy filters specifically designed for the netbook market. New Vikuiti Netbook Filters from 3M, initially available to fit 8.9″ and …
First iPhone WLAN management application
E(z)RF OnTheGo is the first wireless LAN management application available on a smartphone, has been introduced by Meru Networks for the Apple iPhone. Network administrators …
Kerberos 5 Release 1.7 is now available
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free …
Event-based forensics on wireless LANs
E(z)RF Network Manager 2.0, the first wireless LAN management system to record every client-network wireless protocol interaction, rather than merely gathering aggregate …
Gartner survey shows worldwide IT budgets to decline 4.7 percent this year
In the first quarter of 2009, CIOs experienced significant IT budget revisions as executives gained a greater understanding and solidified plans for addressing the global …
Network security strategy from McAfee
McAfee outlined details of its network security strategy which integrates McAfee’s complete network security suite, including network firewalls, intrusion prevention …
East European ATM sniffing down to poor code auditing
Reports that malicious hackers have developed a range of data-sniffing and stealing trojans that have skimmed cardholder data from Eastern European ATMs since the end of 2007 …
FTC shuts down Cutwail botnet but it makes a comeback
The Cutwail botnet, one of the most notorious botnets accounting for up to 35 percent of all spam in May 2009 across the globe, experienced a major blow to its track record …
Apple releases AirPort Utility 5.4.2
AirPort Utility 5.4.2 (DMG download) is the simple to use, setup and management utility for the AirPort Express Base Station, the AirPort Extreme Base Station, and Time …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)