New book: “iPhone Hacks”
Chances are if you own an iPhone (or iPod), you long to discover its hackability, and iPhone Hacks from O’Reilly can help you do just that. Expert authors David Jurick, …
French hacker cracks into Twitter exposing millions of accounts
A French hacker claims he broke into Twitter’s internal administration system, enabling him to access the accounts of millions of Twitter users – including Barack …
Windows 7 RC is now available
Today Microsoft reached a significant milestone with the Release Candidate (RC) of Windows 7, now available for download to MSDN and TechNet subscribers. Broader public …
NetBSD 5.0 is out
NetBSD 5.0 is the thirteenth major release of the NetBSD operating system. It features greatly improved performance and scalability on modern multiprocessor (SMP) and …
Photos: Infosecurity Europe 2009, part 2
Here’s a view of the expo at Infosecurity Europe 2009 in London. The featured companies are: Verizon, GFI, Secure Test and Fortify Software.
Companies increasing IT investments despite volatile economy
More than 25 percent of companies are increasing their investments in information technology (IT) this year, according to the Value of IT Investments survey of more than 500 …
Business leaders overlook IT cost savings in favor of security
A survey commissioned by NetApp has revealed that UK business leaders are in the dark about how to reduce business costs through technology, focusing instead on managing …
Organize and secure audit data with Secure Audit Vault
Kinamik Data Integrity announces the launch of the Secure Audit Vault, a tool that organizes and secures audit data for supporting auditing, control, compliance and …
Updated secure USB flash drives and management software from SanDisk
SanDisk announced that all Cruzer Enterprise models currently shipping are FIPS certified. In addition, SanDisk has released Central Management and Control (CMC) software …
New book: “Programming Entity Framework”
Developers spend far too much time worrying about their backend database, its tables and their relationships, the names and parameters of stored procedures and views, as well …
Run two secure operating environments on a single PC
Neocleus announced NeoSphere, a ground-breaking desktop and laptop management platform and the first Neocleus product built upon Neocleus’ Type 1 client hypervisor. …
Anti-fraud risk score based on device intelligence
iovation is now offering iovation Risk Module, an add-on service to iovation ReputationManager that scores new and unknown devices on the Internet. iovation is expanding its …
Featured news
Resources
Don't miss
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed