Please turn on your JavaScript for this page to function normally.
New book: “Apache Cookbook 2nd Edition”

The new “Apache Cookbook” is a collection of recipes drawn from the fire hose of the Usenet newsgroups, the ApacheFAQ, Apache-related mailing lists, emailed how-to …

Microsoft releases IPsec Diagnostic Tool

Microsoft IPsec Diagnostic Tool assists network administrators with troubleshooting network related failures, focusing primarily on IPsec. The tool checks for common network …

New single agent for endpoint security

Check Point announced Check Point Endpoint Security, a single agent for total endpoint security. It protects PCs and eliminates the need to deploy and manage multiple agents, …

PCI Security Standards Council updates self assessment questionnaire

The PCI Security Standards Council, a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (DSS), PCI PIN Entry Device …

Windows Vista SP1 security improvements

Windows Vista SP1 adds numerous improvements to the original Vista release when it comes to security, reliability, application compatibility, power management and device …

Spam statistics: average message sizes, attachments and images

January 2007 saw Image spam reach its highest peak accounting for 52% of all spam. As Image spam decreased Symantec has observed that the average message size has also …

First automated tool to lockdown Linux servers to meet DISA STIGS

Trusted Computer Solutions announced that Security Blanket 1.2, an automated tool for locking down Linux operating systems, now supports the government’s lock down …

WLAN security applications for OQO Ultra Mobile PC

AirMagnet Laptop Analyzer and AirMagnet Survey are the first WLAN security and management applications to offer platform support for Ultra Mobile Personal Computers (UMPCs). …

Attachmate ships updated set of Secure Shell clients and servers

Attachmate Corporation today announced the availability of Attachmate Reflection for Secure IT 7.0, a set of Secure Shell (SSH) clients and servers for Windows and UNIX that …

Use of worms to steal confidential data increasing in 2008

This year has begun with alarming data: in addition to Trojans, the use of worms to steal users’ confidential data is also on the increase. According to data collected …

Europe crowned new king of spam

According to the Symantec State of Spam Report, the percentage of spam messages that claimed to originate from Europe is now significantly greater than the percentage of spam …

Attend Black Hat DC Briefings 2008 for FREE!

We have four complimentary access passes to the upcoming Black Hat DC Briefings. The Briefings will be held February 20-21 in Westin Washington DC City Center. The admission …

Don't miss

Cybersecurity news