Help Net Security
Image-sensing technology for tracking individuals
Fujitsu announced the development of a new image-sensing technology that can thoroughly and accurately track – without blind spots – the motion paths of multiple …
New book: “Programming Amazon Web Services”
The web is full of opportunities for companies both large and small, but smaller companies face a difficult problem: infrastructure. Industrial-strength infrastructure can be …
K-12 schools’ cyber safety declines
CDW Government (CDW-G) announced the results of the 2008 School Safety Index, the national benchmark on the current status of public school district safety. Based on eight …
Information Assurance: National Security’s New Front Line
Nowadays, few would ever consider using the Internet “unprotected” without a reliable anti-virus software and firewall solution installed on their PC networks. Yet …
Home security, monitoring and automation platform
uControl announced a software platform that allows service providers to deploy cutting edge Home Security, Monitoring and Automation (SMA) services. The uControl SMA Platform …
Changes to the Nessus Vulnerability Scanner subscription model
Tenable’s CEO Ron Gula and Nessus creator Renaud Deraison posted a letter to the Nessus community announcing some changes in the subscription model. Since creating and …
Japanese P2P virus writer convicted, but escapes jail
24-year-old Masato Nakatsuji, who was the first ever virus writer to be arrested in Japan when he was apprehended in January, admitted writing the malware which displayed …
Big Book of Windows Hacks
When it comes to "how to" articles there's a wealth of free material available online. With the growing popularity of blogs, a myriad of people are eager to share their hacks …
New book: “The Book of IMAP”
The Internet Message Access Protocol (IMAP) allows clients to access their email on a remote server, whether from the office, a mobile phone, or a hotel room in Outer …
IT spending concerns mounting
An Astaro survey of over 350 attendees of the Interop Las Vegas conference indicates that a 2008 recession will effect IT spending for 52 percent of participants. This is an …
E-mail mismanagement puts organizations at risk
E-mail is arguably the single largest source of information creation for most organizations. Yet for the majority, email is poorly managed – if at all. According to …
Majority of U.S. consumers are likely to enroll in voice verification
According to a study conducted by Harris Interactive for Nuance Communications, consumers are embracing the use of voice verification in protecting important personal …
Featured news
Resources
Don't miss
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers
- U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
- A safer way to break industrial systems (on purpose)
- Maltrail: Open-source malicious traffic detection system