Please turn on your JavaScript for this page to function normally.
Wireless Security for Hotspot Users: iPig to the Rescue

Germany based, Windows security and web applications experts at iOpus, just released iPig, a freeware wireless security application. Currently in beta version and therefore …

Using a Blog Service to Minimize Your Exposure to Spammers

Blogs are extremely popular nowdays. I spend most of my non-business related surfing time on blogs. As the number of blogs is increasing every day, I often come across …

China’s Leading Domain Name Registry Service Provider Deploys NFR Security’s Sentivist Solution

ROCKVILLE, MD, July 18, 2005 – NFR Security, Inc., the leader in Real-Time Threat Protectionâ„?, today announced that the China Internet Network Information Center …

O’Reilly Releases “802.11 Wireless Networks: The Definitive Guide, Second Edition”

Farnham, UK–The appeal of wireless networks comes down to two things, according to Matthew Gast: “People move. Networks don’t.” In a world that’s …

Gerhard Eschelbeck on the Common Vulnerability Scoring System (CVSS)

Gerhard Eschelbeck is the CTO & Vice President of engineering of Qualys. In this audio Mr. Eschelbeck discusses the Common Vulnerability Scoring System (CVSS), the …

Qualys CTO on SANS Top 20 Quaterly Update

More than 600 new Internet security vulnerabilities were discovered during the first quarter of 2005, according to the SANS Institute and a team of experts from industry and …

Infosecurity Europe 2005 – First Issue of (IN)SECURE Magazine Available for Download

During the second day of Infosecurity Europe 2005 Conference, HNS announced the first issue of (IN)SECURE Magazine, a freely available, freely distributable digital security …

Infosecurity 2005 – Innovative Method Fuels Business Opportunities

Two weeks ago, Reed Exhibitions held the annual Infosecurity Europe press conference. During the event, hosted in the classy London Millenium Knightsbrdige Hotel, selected …

Data Security Summary of 2004

Mikko Hypponen, Director of Anti-Virus Research at F-Secure, presents HNS visitors with an overview of data security in 2004. The audio concentrates on viruses, worms, …

Scope on Application Vulnerability Description Language

The Application Vulnerability Description Language (AVDL) is a rather new security interoperability standard within the Organization for the Advancement of Structured …

The Fedora – Red Hat False Vulnerability Scam

It looks like the “evil minds” have found a new way to use spam for their devious plans. This time spam is combined with a scam that will try to use social …

Tips on Securing Instant Messaging

According to one of the latest research studies, 92% of all commerical and non-commerical organizations are using instant messaging in the enterprise. Tom Buoniello, VP of …

Don't miss

Cybersecurity news