Help Net Security
IT security standards planetarium
atsec information security today published the “IT security standard planetarium”, which depicts the relationships among many IT security standards. You can choose …
New Deep Security server and application protection software
Third Brigade announced the availability of Third Brigade Deep Security 6, the next generation in server and application protection for dynamic datacenters. It is the first …
Less than six weeks till SCALE 7X
Southern California Linux Expo (SCALE 7x) is one of the conferences we are media sponsoring via our publications. The event starts in just over a month and here is the latest …
Burglar arrested as police post CCTV images on Facebook
Sophos informs us that police in New Zealand have used popular social networking website Facebook to aid their criminal investigations, following the arrest of a 21-year-old …
Network Security Toolkit 1.8.1 has been released
The Network Security Toolkit is a bootable ISO live CD/DVD is based on Fedora 8. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security …
Video: Practitioner’s guide to capturing and analysis of RAM
Embedded below is Dale Beauchamp’s talk “Practitioner’s guide to capturing and analysis of RAM” from January 8th’s DojoSec event.
Security and other factors will dominate outsourcing decisions in 2009
The end-user, the economy, security requirements and the environment will be among the leading factors influencing enterprise clients’ technology outsourcing decisions …
New Cisco Aironet 1140 Series Access Point
Cisco announced the Aironet 1140 Series Access Point, the only dual-radio platform that combines full 802.11n Draft 2.0 performance (up to nine times the throughput of …
Microsoft releases security update
This security update resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Microsoft Server Message Block (SMB) Protocol. The …
Web Security Testing Cookbook
Buying furniture on eBay, selling childhood ZX Spectrum cassette tapes, doing online banking - every service we use is powered by a robust web application. With all the …
Future of Privacy Forum issues recommendations for the new presidential administration
The Future of Privacy Forum (FPF) today proposed seven privacy recommendations to the upcoming administration. FPF Co-chairs Jules Polonetsky and Christopher Wolf applaud …
New phishing attack that infiltrates secure website sessions
Trusteer’s research organization has identified a new phishing attack method designed to trick users into surrendering confidential information after they have logged on …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?