New book: “High Performance MySQL, Second Edition”
The new edition of High Performance MySQL teaches advanced techniques in depth so readers can bring out MySQL’s full power. Readers can learn how to design schemas, …
SSH key-based attacks
US-CERT is aware of active attacks against Linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access …
A third of IT staff snoop at confidential data
Exercise extreme caution when it comes to dismissing employees with knowledge of your IT systems. Cyber-Ark’s annual survey around “Trust, Security & …
More malware blocked in July 2008 than in the whole of 2007
In its Global Threat Report ScanSafe reported that the total number of Web-based malware blocks has increased by 87 per cent in July 2008 compared to the previous month. …
Panda Security launches its 2009 antivirus products
Panda Security has launched its 2009 range of antivirus solutions for the consumer sector. The product line-up comprises Panda Antivirus Pro 2009, Panda Internet Security 2009 …
BT enhances security monitoring service
BT announced the enhancement of its global Event Monitoring and Correlation service to further defend enterprise networks against the growing threat of malicious botnet …
Wireless DTCP content protection specification
The Digital Transmission Licensing Administrator (DTLA) has approved and published a new supplement to the Digital Transmission Content Protection (DTCP) Specification for the …
HNS Book giveaway: “The Best of 2600 – A Hacker Odyssey”
We are giving one of our readers a copy of “The Best of 2600 – A Hacker Odyssey“. Since 1984, the quarterly magazine 2600 has provided fascinating articles …
Most organizations fail to stop interior network threats
A survey by Opine Consulting revealed nearly half of the IT professionals who responded had endpoints connecting to their corporate networks without their knowledge. Yet …
A multivendor open automation framework
The IP networking industry is rapidly introducing more intelligent systems. This new breed of network offers a wide array of converged services extending from routing and …
External hard drives with RFID security key data encryption onboard
Aluratek announced the availability of its new Tornado plus line of external hard drives featuring built-in radio frequency identification (RFID) security key data encryption, …
Security breaches blast through the 2007 record
The total number of breaches on the Identity Theft Resource Center’s 2008 breach list has surpassed the final total of 446 reported in 2007 — more than four months …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)