Please turn on your JavaScript for this page to function normally.
Researchers work on self-healing cloud infrastructure

Cloud computing has become completely ubiquitous, spawning hundreds of new web based services, platforms for building applications, and new types of businesses and companies. …

Software sensor for wireless intrusion detection

Fluke Networks today announced a new version of its WLAN security and performance monitoring solution, AirMagnet Enterprise, Version 10, which offers the industry’s …

Thwarting attacks with genetically-inspired computer configuration systems

In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In …

Chinese hackers infiltrated US Chamber of Commerce

The computer systems of the US Chamber of Commerce, a lobbying group that represents the interest of US businesses and trade organizations, have been infiltrated by hackers. …

Next-generation firewall with integrated IPS

Sourcefire announced its Next-Generation Firewall (NGFW) which combines IPS threat prevention, integrated application control and firewall capabilities in a high-performance …

McAfee shoots for next generation IPS

McAfee announced its network security framework which integrates advanced network intrusion prevention with essential next-generation controls. The solution addresses a need …

163 new advanced evasion techniques discovered

Stonesoft announced it has delivered 163 new advanced evasion technique (AET) samples for global vulnerability coordination. The new samples include AETs over a number of …

ICSA Labs launches network IPS testing program

ICSA Labs is launching a quarterly testing program for network intrusion prevention systems. The quarterly testing, which is available to all IPS manufacturers, is also an …

McAfee introduces anti-rootkit security beyond the OS

Cybercriminals know how to evade current operating systems-based security, demanding a new paradigm – security beyond the operating system. On that note, McAfee …

HoneyPoint Console 3.50 released

HoneyPoint Console 3.5 gives more capability to the security team to easily drill down for more data and export that data to a CSV file. A more powerful report …

Was your company one of the targets of Operation Shady RAT?

“I divide the entire set of Fortune Global 2000 firms into two categories: those that know they’ve been compromised and those that don’t yet know,” …

Coding error reveals RSA attackers operated from China

A simple error message returned by a server to which a malware sample was trying to connect revealed to Dell SecureWorks researchers the origin of the RSA attack, says Joe …

Don't miss

Cybersecurity news