Help Net Security
HP unveils new family of next-generation firewall appliances
HP unveiled its new family of HP TippingPoint Next-Generation Firewall (NGFW) appliances to further protect customers from threats introduced by mobile and cloud computing. …
Week in review: Undetectable hardware Trojans, Chinese hackers for hire, and latest IE 0-day insight
Here’s an overview of some of last week’s most interesting news and articles: NSA impersonated Google in MitM attacks After all the recent revelations about the …
Eight arrested over £1.3 million theft from Barclays bank
Eight men have been arrested by the Metropolitan Police’s Central e-Crime Unit (PCeU) in connection with a £1.3 million theft by a gang who stole the money by …
ENISA report on top cyber threats
ENISA presented its list of top cyber threats, as a first “taste” of its interim Threat Landscape 2013 report. The study analyses 50 reports, and identifies an …
HP helps government agencies protect information
HP announced HP Continuous Monitoring, designed to identify and report IT security vulnerabilities in real time. The solution provides U.S. government agencies with an …
DeviceLock now prevents data leakage from Macs
DeviceLock announced DeviceLock Endpoint DLP Suite 7.3 that delivers essential device control capabilities for corporate endpoints with OS X Lion and OS X Mountain Lion …
Acronis advances secure BYOD with mobilEcho
Acronis launched mobilEcho 4.5, a mobile file management (MFM) solution that now includes in-app editing tools for Microsoft Office documents and military-grade, certified …
Latest IE 0-day insight: Background, severity and solutions
This recently discovered Internet Explorer zero day vulnerability is bad. Users and administrators should take immediate action to mitigate the risk. Considering the timing, I …
Mobile data security remains weak
Coalfire surveyed 400 individuals working in a variety of industries across North America who are not affiliated with their company’s IT department. Survey findings show …
The legal implications of BYOD
The legality of the common practice of remotely wiping or tracking an employee’s mobile device while asking workers to sign waivers giving their consent for such a …
Phishers increasingly target brands
The APWG is reporting in its latest Global Phishing Survey: Trends and Domain Name Use study that an increasing number of brands and their users have been targeted by …
What keeps IT pros up at night?
A new EiQ Networks survey reveals several concerns among IT professionals. The survey reflects responses from 272 IT decision makers including security managers, and network …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems