Intel ships enterprise-class solid-state drives
Intel has begun shipping the Intel X-25E Extreme SATA Solid-State Drive (SSD), aimed at server, workstation and storage systems. Unlike mechanical drives, the SSDs contain no …
Iomega Linux-powered secure NAS device
Iomega announced the new StorCenter ix2, a network storage appliance for small businesses and the home. With just four mouse clicks, users can configure up to two terabytes of …
Flash Player update addresses Clickjacking issue
Potential vulnerabilities have been identified in Adobe Flash Player 9.0.124.0 and earlier that could allow an attacker who successfully exploits these potential …
Phishing campaign targeting Facebook aficionados
BitDefender researchers have detected an IM-based spam wave automatically sent to accounts which promises a “hot date” if the Facebook’s users access the …
Protection suite for Linux multi-site cluster
New SteelEye Protection Suite for Linux Multi-Site Cluster is aimed towards Linux users looking to cost-effectively extend existing high-availability capabilities as well as …
Spammers cloak their reputation
A major trend throughout 2008 that intensified during the third quarter is spammers’ increased use of cloaking techniques to hide their poor reputation behind someone …
New book: “Nagios: System and Network Monitoring, 2nd Edition”
The convenience and reliability that monitoring programs offer system administrators is astounding. Whether at home, commuting, or on vacation, admins can continuously monitor …
NVIDIA Tesla supercomputers used for password recovery
ElcomSoft announces the support of the latest generation of NVIDIA Tesla, compact supercomputers based on NVIDIA GPU acceleration technologies, in Elcomsoft Distributed …
Global State of Information Security Survey 2008 findings
Asian companies have made dramatic gains in upgrading their information security efforts, according to the 6th annual Global State of Information Security Survey 2008. The …
Q3 2008 Email Threats Trend Report highlights
 New camouflage tactics spammers use to cloak their bad reputations enable malware and unwanted messages to infiltrate inboxes, according to a new report by Commtouch. …
Organized cybercrime replaces random individual attacks
Targeted and organized, profit-driven attacks are replacing random individual hacker attacks and presenting increased threats for businesses and government, says the …
Data privacy application from SAP and Cisco
SAP and Cisco announced the availability of a composite application that will help organizations proactively enforce data privacy across the business network. The solution is …
Featured news
Resources
Don't miss
- What managing partners should ask AI vendors before signing any contract
- Anthropic’s new AI model finds and exploits zero-days across every major OS and browser
- Comp AI: The open-source way to get compliant with SOC 2, ISO 27001, HIPAA and GDPR
- The case for fixing CWE weakness patterns instead of patching one bug at a time
- Google study finds LLMs are embedded at every stage of abuse detection