Help Net Security
Despite mandate, only 30% of government devices are encrypted
Committee on Homeland Security Chairman Bennie G. Thompson (D-MS) and Committee Member Zoe Lofgren (D-CA) announced the release of a Government Accountability (GAO) report on …
StealthWatch System 5.8 for increased network visibility
Lancope announced the general availability of StealthWatch System 5.8. The system-wide upgrade includes new features that further utilize flow data, including Cisco IOS …
Cyber threats accelerate and browser vulnerabilities proliferate
IBM today released results from its X-Force 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that …
First database security solution for virtual environments
Secerno announced the availability of its award-winning Secerno.SQL database activity monitoring and blocking solution as a virtualised appliance on the Vmware platform. This …
Traditional vs. Non-Traditional Database Auditing
Traditional native audit tools and methods are useful for diagnosing problems at a given point in time, but they typically do not scale across the enterprise. The auditing …
Motorola to acquire AirDefense
Motorola has signed a definitive agreement to acquire privately held AirDefense, a leading wireless LAN (WLAN) security provider. Terms of the transaction were not disclosed. …
Enhanced enterprise-class data backup and recovery tools
Advanced Vault announced that the company’s data backup and recovery tools now provide support for 64-bit editions of Windows, Linux, Mac and FreeBSD operating systems. …
New modular 3-phase UPS systems
Tripp Lite, a manufacturer of power protection and connectivity equipment, has launched its latest range of Modular 3-Phase UPS Systems. The four new models, which include …
FBI vs Facebook
Another round of malware is being spammed with a subject “F.B.I. wants instant access to Facebook” and a link to a page hosting a malicious .exe file. E-mail: Web …
Upcoming Black Hat USA 2008 session: Jinx – Malware 2.0
Today’s Web 2.0 world sparks opportunities for Internet interactivity and community-building, but at the same time, leaves many Web sites and online users vulnerable to …
The changing role of information security in the enterpirse
Information security professionals believe they are moving towards a more pro-active, risk-based approach to securing their organisations and away from just IT and …
New approach to defending against WLAN parking lot attacks
Meru Networks has introduced RF Barrier, the first IEEE 802.11-based technology for proactively defending wireless networks against eavesdroppers and “parking lot” …
Featured news
Resources
Don't miss
- ClickFix campaign delivers Mac malware via fake Apple page
- Poisoned “Office 365” search results lead to stolen paychecks
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)