5 million new threats in three months
According to a new PandaLabs report the major story this quarter is that attackers have broken all records when it comes to creating new threats as over the last three months …
Network packet generator Hyenae 0.35-1 released
Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable …
Will Germany’s secret service be allowed to conduct online computer searches?
According to Deutsche Welle, a German newspaper unearthed a secret document belonging to the Interior Ministry, in which is suggested that the secret service should be allowed …
Xirrus Advanced RF Analysis Manager for 802.11n networks
Xirrus announced its RF Analysis Manager (RAM) for testing and troubleshooting of 802.11n wireless networks. Xirrus’ RAM equips each Xirrus Wi-Fi Array with a set of …
Net Optics expands data monitoring switch family
Net Optics announced the expansion of its Director data monitoring switch family with the addition of Director 5400 and advanced load balancing functionality across the entire …
FBI (partially) discloses domestic investigations and operations guidelines
Last December, the Electronic Frontier Foundation demanded of the FBI to disclose publicly their controversial Domestic Investigations and Operations Guidelines (DIOG). After …
Report: The Internet has never been more dangerous
The APWG’s latest Phishing Activity Trends Report illustrates electronic crime’s innovation and apparently unchecked ambition with new records being reached for …
Video: Build a free SSL VPN on Linux or Windows
This time on the Hak5 show, bypass restrictive firewalls with a free and open source virtual private network server for Windows and Linux that will have you connecting back to …
ICANN and U.S. Department of Commerce sign accord on Internet governance
ICANN and the U.S. Department of Commerce have signed an historic Affirmation agreement supporting the ICANN model of international multi-stakeholder and bottom-up governance …
McAfee expanding capabilities for Firewall Enterprise
McAfee will be expanding the existing application protection in its McAfee Firewall Enterprise appliance product line. With this expansion, the product will give security …
ttyutils: Terminal session hijacking toolkit 2.0.13 released
Ttyutils is Unix/Linux terminal session hijacking toolkit. It is also a customizable and extendible platform. By creating a pseudo terminal to run a program, ttyutils can …
China on the rise as overall spam and virus levels decline
The level of spam and viruses has dropped for the second month running, as the US and Brazil continue to be the primary sources, according to Network Box. Network Box’s …
Featured news
Sponsored
Don't miss
- Ransom recovery costs reach $2.73 million
- What is cybersecurity mesh architecture (CSMA)?
- New SOHO router malware aims for cloud accounts, internal company resources
- Dropbox says attackers accessed customer and MFA info, API keys
- 2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element