Kerberos 5 Release 1.7 is now available
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free …
Event-based forensics on wireless LANs
E(z)RF Network Manager 2.0, the first wireless LAN management system to record every client-network wireless protocol interaction, rather than merely gathering aggregate …
Gartner survey shows worldwide IT budgets to decline 4.7 percent this year
In the first quarter of 2009, CIOs experienced significant IT budget revisions as executives gained a greater understanding and solidified plans for addressing the global …
Network security strategy from McAfee
McAfee outlined details of its network security strategy which integrates McAfee’s complete network security suite, including network firewalls, intrusion prevention …
East European ATM sniffing down to poor code auditing
Reports that malicious hackers have developed a range of data-sniffing and stealing trojans that have skimmed cardholder data from Eastern European ATMs since the end of 2007 …
FTC shuts down Cutwail botnet but it makes a comeback
The Cutwail botnet, one of the most notorious botnets accounting for up to 35 percent of all spam in May 2009 across the globe, experienced a major blow to its track record …
Apple releases AirPort Utility 5.4.2
AirPort Utility 5.4.2 (DMG download) is the simple to use, setup and management utility for the AirPort Express Base Station, the AirPort Extreme Base Station, and Time …
British communist party website infected by malware
Researchers at Sophos have discovered that the website of the British Communist Party has had malware planted on it by attackers, designed to infect the computers of potential …
MIS Training Institute’s annual information security survey
The MIS Training Institute’s annual information security survey was designed to identify the latest challenges, priorities, investment and management decisions faced by …
(ISC)2 urges focus on workforce development in implementing Obama’s cybersecurity plan
(ISC)2 announced its support of the recommendations to advance the federal cybersecurity workforce as outlined in the report titled, “Cyberspace Policy Review,” …
Little Snitch 2.1.4 released
Little Snitch informs you whenever a program attempts to establish an outgoing Internet connection. You can then choose to allow or deny this connection, or define a rule how …
73% of companies believe they are vulnerable to hacking
Seventy three percent of IT professionals admit their software applications are still vulnerable to hackers, only an eight percent reduction on last year’s startling …
Featured news
Sponsored
Don't miss
- 2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element
- Securing your organization’s supply chain: Reducing the risks of third parties
- Understanding emerging AI and data privacy regulations
- reNgine: Open-source automated reconnaissance framework for web applications
- Women rising in cybersecurity roles, but roadblocks remain