Help Net Security
1Password 4 for Mac released
1Password, the most popular password manager for the Mac, has been updated today with the launch of version 4. Great news for Mac App Store customers as all of them will …
The Internet of Things will change everything
The Internet of Things (IoT) represents a new construct in the ICT world that is occupying the minds of IT vendors, service providers, and systems integrators as it represents …
Are workers drowning in a sea of ineffective technology?
With the rise of mobile, the cloud and multiple device use, today’s workers are more connected than ever before, giving them access to high-volume streams of information …
Bruce Schneier: The battle for power on the Internet
Bruce Schneier gives us a glimpse of the future of the internet, and shares some of the context we should keep in mind, and the insights we need to understand, as we prepare for it.
Technology eliminates bot-infected traffic from advertising campaigns
White Ops introduced a systematic solution for eliminating bot-infected traffic from advertising campaigns. “We have spent over a year tracking the bad guys attacking …
Aruba Networks releases cloud Wi-Fi solution
Aruba Networks announced a new cloud-managed Wi-Fi solution that combines the simplicity of a cloud service with the performance, manageability and reliability of …
McAfee solution remediates advanced malware
McAfee announced an end-to-end solution to help organizations combat the increasing challenges of advanced malware. McAfee goes beyond single-feature, static analysis …
Is wireless the Trojan horse in your network security?
According to Roger Klorese of WatchGuard technologies, smartphones and tablets now account for about 25% of devices used for work in the US. Wireless, mobility and BYOD are …
Could the EU cyber security directive cost companies billions?
Many of the world’s largest enterprises are not prepared for the new European Union Directive on cyber security, which states that organizations that do not have …
Connections between personality types and phishing
Phishing scams are some of the most effective online swindles, hooking both savvy and naive computer users. New insights from researchers at the Polytechnic Institute of New …
Video: Cracking corporate passwords
Cracking corporate passwords is different than cracking public MD5 leaks off of pastebin. Corporate passwords are not in the same formats you are used to, they require capital …
Splunk Enterprise 6 released
Splunk announced Splunk Enterprise 6, which delivers analytics, up to 1,000 times faster than previous versions, and patent-pending technology designed to unlock the value of …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations