Please turn on your JavaScript for this page to function normally.
Browser privacy in Internet Explorer 8 Beta

With the new beta of Internet Explorer 8, Microsoft introduced InPrivate Browsing which helps prevent your browsing history, temporary Internet files, form data, cookies, and …

Researchers’ new algorithm significantly boosts routing efficiency of networks

A new algorithm developed by computer scientists at the University of California, San Diego helps answer that question, at least for computer networks, and it promises to …

Logitech video security cameras available in Europe

Logitech announced the company’s video security cameras are now available in Europe for the first time. Both PC-based security cameras feature do-it-yourself (DIY), …

New book: “High Performance MySQL, Second Edition”

The new edition of High Performance MySQL teaches advanced techniques in depth so readers can bring out MySQL’s full power. Readers can learn how to design schemas, …

SSH key-based attacks

US-CERT is aware of active attacks against Linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access …

A third of IT staff snoop at confidential data

Exercise extreme caution when it comes to dismissing employees with knowledge of your IT systems. Cyber-Ark’s annual survey around “Trust, Security & …

More malware blocked in July 2008 than in the whole of 2007

In its Global Threat Report ScanSafe reported that the total number of Web-based malware blocks has increased by 87 per cent in July 2008 compared to the previous month. …

Panda Security launches its 2009 antivirus products

Panda Security has launched its 2009 range of antivirus solutions for the consumer sector. The product line-up comprises Panda Antivirus Pro 2009, Panda Internet Security 2009 …

BT enhances security monitoring service

BT announced the enhancement of its global Event Monitoring and Correlation service to further defend enterprise networks against the growing threat of malicious botnet …

Wireless DTCP content protection specification

The Digital Transmission Licensing Administrator (DTLA) has approved and published a new supplement to the Digital Transmission Content Protection (DTCP) Specification for the …

HNS Book giveaway: “The Best of 2600 – A Hacker Odyssey”

We are giving one of our readers a copy of “The Best of 2600 – A Hacker Odyssey“. Since 1984, the quarterly magazine 2600 has provided fascinating articles …

Most organizations fail to stop interior network threats

A survey by Opine Consulting revealed nearly half of the IT professionals who responded had endpoints connecting to their corporate networks without their knowledge. Yet …

Don't miss

Cybersecurity news