Help Net Security
Mobile IDS/IPS solution for iOS devices
Skycure introduced its mobile IDS/IPS solution that protects iPhones and iPads by monitoring network traffic behavior and remediating suspicious activity. Existing solutions …
The IT road to hell
The past several months have been an unending nightmare for the US government and its allies, as one disclosure after another has caused unimaginable damage to relationships, …
Video: Operationalizing security intelligence in the enterprise
Many organizations say they acquire and use security intelligence for the benefit of their organizations – but few actually do this right. While security intelligence is …
Week in review: Vessel tracking system cracked, iCloud protocols analyzed, the relevancy of AV tests
Here’s an overview of some of last week’s most interesting news, videos, inteviews and articles: Digital ship pirates: Researchers crack vessel tracking system In …
Big thinkers converge on small town for Day-Con 2013
Day-Con, Dayton Ohio’s annual hacker conference, celebrated its 7th year last month with a completely re-imagined format: limited seating, invitation only, and …
Ubuntu 13.10 released, improves on cloud setup and management
Canonical released the next version of Ubuntu for server and cloud environments. Ubuntu 13.10 delivers the latest and best version of OpenStack, and is the fastest, most …
Webroot enhances mobile threat protection
Webroot released a new edition of Webroot SecureAnywhere Business – Mobile Protection to ensure mobile devices and company data stay secure. As more organizations face …
avast! 2014 released
AVAST Software launched avast! 2014 – the latest version of the antivirus solution used by a quarter of all protected PCs worldwide. The new version improves …
Video: Malware Management Framework
You can throw lots of time and money at scanning your systems for unknown malware, but the reality is that you will only identify a small portion of the bad stuff. Changing …
Plan to fail for better security
We’ve all heard the old saying: “If you fail to plan, you’re planning to fail.” Of course, it’s true: and from a security viewpoint, it’s …
How CISOs get executive buy-in for security budgets
Wisegate released a new report that shares how CISOs successfully gain executive buy-in on security budgets and strategically manage them. Most CISOs face significant …
The Internet of Things: Vulns, botnets and detection
Does the Internet of Things scare you? It probably should. This DerbyCon video discusses why embedded device security is laughably bad, handling vendor notification, and …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations