Help Net Security
Logitech video security cameras available in Europe
Logitech announced the company’s video security cameras are now available in Europe for the first time. Both PC-based security cameras feature do-it-yourself (DIY), …
New book: “High Performance MySQL, Second Edition”
The new edition of High Performance MySQL teaches advanced techniques in depth so readers can bring out MySQL’s full power. Readers can learn how to design schemas, …
SSH key-based attacks
US-CERT is aware of active attacks against Linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access …
A third of IT staff snoop at confidential data
Exercise extreme caution when it comes to dismissing employees with knowledge of your IT systems. Cyber-Ark’s annual survey around “Trust, Security & …
More malware blocked in July 2008 than in the whole of 2007
In its Global Threat Report ScanSafe reported that the total number of Web-based malware blocks has increased by 87 per cent in July 2008 compared to the previous month. …
Panda Security launches its 2009 antivirus products
Panda Security has launched its 2009 range of antivirus solutions for the consumer sector. The product line-up comprises Panda Antivirus Pro 2009, Panda Internet Security 2009 …
BT enhances security monitoring service
BT announced the enhancement of its global Event Monitoring and Correlation service to further defend enterprise networks against the growing threat of malicious botnet …
Wireless DTCP content protection specification
The Digital Transmission Licensing Administrator (DTLA) has approved and published a new supplement to the Digital Transmission Content Protection (DTCP) Specification for the …
Application Security Matters: Deploying Enterprise Software Securely
One of the most interesting aspects of being an information security consultant is the exposure to an enormous variety of industries and organizations. From health care to …
HNS Book giveaway: “The Best of 2600 – A Hacker Odyssey”
We are giving one of our readers a copy of “The Best of 2600 – A Hacker Odyssey“. Since 1984, the quarterly magazine 2600 has provided fascinating articles …
Most organizations fail to stop interior network threats
A survey by Opine Consulting revealed nearly half of the IT professionals who responded had endpoints connecting to their corporate networks without their knowledge. Yet …
A multivendor open automation framework
The IP networking industry is rapidly introducing more intelligent systems. This new breed of network offers a wide array of converged services extending from routing and …
Featured news
Resources
Don't miss
- How to give better cybersecurity presentations (without sounding like a robot)
- Layoffs pose a cybersecurity risk: Here’s why offboarding matters
- Fake AI platforms deliver malware diguised as video content
- LockBit hacked: What does the leaked data show?
- May 2025 Patch Tuesday forecast: Panic, change, and hope