Recently acquired, the Metasploit project is a popular pen testing framework loved by white- and black-hats alike. Now that it has a corporate parent, does it have a future as a viable open source project?
Cloud is here, it's real and it's rapidly maturing to the point where the benefits are starting to appeal to those looking to solve enterprise risk and economic issues.
Network security isn't easy, but there are plenty of ways to maximize the return you get on your efforts. Here are fifteen ways to gain a lot more security for less effort than you might expect.
You might be ready to move beyond OpenVPN, but feel daunted by IPSEC's learning curve. With our quick guide, you'll be up and running with free, open Openswan in no time.
For smaller setups and times when you don't need server-to-server tunnels, OpenVPN may do the trick. But where do you turn when you need cross-platform security without any performance compromises?
Can your vulnerability management program adapt to local application attack vectors? Nowadays, keeping pace with worms and viruses means getting creative about policies.
The latest survey by the Anti Phishing Working Group shows that organized phishing syndicates are working all the angles to get their hands on the most valuable data.
Hackers and e-crooks have moved beyond the low-hanging fruit of online banks and eBay as primary targets for their elaborate phishing schemes, according to a new report.
In an address at the annual RSA show, FBI Director Robert Mueller outlines challenges the agency has in fighting cyber crime, seeks broader partnerships with private-sector firms.
Despite the lousy macroeconomic climate and tighter IT budgets, most information technology workers charged with protecting data networks got a raise last year and will likely get another this year.
Department of Homeland Security Secretary Janet Napolitano told security experts and media that while many great ideas have been suggested, less talk and more action is needed to safeguard government and corporate networks.
Security experts are torn between just how far the government and the private sector should go to protect critical data from cyber criminals without violating individual rights.
The open source ClamAV project is setting its sights on buggy Windows desktop installations after making a name for itself safeguarding e-mail gateways.
RSA panel of experts says the U.S. is under daily cyber attacks by China, Russia, and their proxies. What can we do to protect our key systems and privacy?
"Mariposa" gained access to information in more than 13 million PCs worldwide, making it one of the most destructive botnets in history, though authorities say that the operators weren't sophisticated hackers.
Three Spanish hackers believed to be responsible for using a botnet to steal log-in credentials and customer banking data were arrested following a multinational investigation.
Internet security experts say massive botnet attack impacted computers in more than 190 countries and more than half of the world's 1,000 largest companies.