Help Net Security
How to protect from man-in-the-middle attacks
In light of a new man-in-the-middle type of attack unveiled this week at Black Hat D.C., VeriSign provides simple tips for end users and businesses. The highlighted attack is …
D-Link unveils 802.11n dual-band wireless access point
D-Link is now shipping its latest 802.11n WLAN solution (DAP-2553). The high-speed AP includes integrated 802.3af PoE support, so the device can be mounted where power outlets …
Gmail users hit by phishing chat attack
Gmail users should be on their guard against phishing attacks following news that the email system has been the target of a campaign that spread via the Google Talk instant …
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Amazon Web Services (AWS) is a suite of web services provided by the e-commerce giant, that offers third party developers a way to build on its technology platform. Soon after …
Excel vulnerability puts Macs to risk
Microsoft is investigating new public reports of a vulnerability in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel …
Sync your firewall configurations with Playbook
Matasano Chargen released Playbook 2.0, which makes it easier to manage your network’s firewall rules. It syncs your firewall configurations with a central web-based …
Juniper EX2500 ethernet switch for high-density 10GbE deployments
Juniper Networks announced the expansion of its Ethernet switching product portfolio with the EX2500 line of 10 Gigabit Ethernet (GbE) switch. The EX2500 line will be targeted …
Video: Duc Nguyen on the weaknesses of facial recognition software
In this video, Black Hat founder Jeff Moss interviews Black Hat speaker Duc Nguyen about his presentation on the weaknesses of facial recognition software from several major …
New type of SQL injection attack compromised 500,000+ Web sites
Breach Security announced that web attackers unleashed a new type of SQL injection attack in 2008 that successfully compromised more than 500,000 web sites, according to its …
High performance RAID controller for industrial and embedded applications
Accordance Systems announced the new ARAID M200 RAID 1 Controller that provides backup and security capabilities for industrial and embedded applications where 100% uptime is …
RSA Conference 2009 expands keynote lineup
RSA Conference announced its expanded keynote speaker lineup for the 2009 event in San Francisco. World-class technology leaders presenting at RSA Conference include: John …
ZoneAlarm Extreme Security all-in-one software suite
Check Point released ZoneAlarm Extreme Security, a new all-in-one software suite that combines core technologies with browser security to give consumers protection against …
Featured news
Resources
Don't miss
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)