Please turn on your JavaScript for this page to function normally.
iSSH: iPhone and iPad SSH client

iSSH is a comprehensive VT100, VT102, VT220, ANSI, xterm, and xterm-color terminal emulator over SSH and telnet, integrated with a tunneled X server and VNC client. iSSH is …

Last chance to get £225 off your RSA Conference Europe registration

RSA Conference Europe 2010 uncovers new threats emerging and how you can contain them. Over three days get the practical knowledge to protect your organization. Choose from …

Hackers: Heroes of the Computer Revolution

This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers—those brilliant and eccentric nerds …

The top benefits of virtualization

According to a CDW-G report, 77 percent of agencies are implementing at least one form of virtualization, and of those, 89 percent are benefiting from the technology. Benefits …

Win a copy of “Cyber War” or “Hacking: The Next Generation”

Subscribe to the Help Net Security newsletter and win one of these books: If you win, we will e-mail you on July 19. Our weekly newsletter is packed with information security …

Metasploit training program launched

Rapid7 and SANS will provide comprehensive training to the growing global community of Metasploit Framework users. The Metasploit Framework is an open source project managed …

SSL Labs 1.0.63 comes with improvements

The latest revision of the SSL Labs assessment engine adds several improvements in the area of certificate chains. The engine will now try to download missing intermediate …

Prevent web application abuse

Mykonos Software announced a new release of the Mykonos Security Appliance, aimed at preventing Web application abuse. Targeted at organizations with significant web …

Fake eBay “payment request” e-mails lead to malware

E-mails purporting to contain a payment request from eBay are hitting inboxes around the world: The message contains no text – just an attached .html file. If the file …

Rogue software details: AV Security Suite

AV Security Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Imperva mitigates insider threats

Imperva announced a File Security product line. SecureSphere File Firewall prevents unauthorized access to unstructured data residing on file servers, network attached storage …

Microsoft closes five vulnerabilities in Windows and Office

In today’s Patch Tuesday, Microsoft delivers four bulletins that close five vulnerabilities in Windows and Office. Wolfgang Kandek, Qualys CTO, comments: …

Don't miss

Cybersecurity news