Help Net Security
Liberty Reserve laundered $6 billion through illegal transactions
An indictment has been unsealed on Tuesday charging Liberty Reserve, a company that operated one of the world’s most widely used digital currency services, and seven of …
Addonics releases CipherUSB family of hardware encryption solutions
Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …
McAfee unveils Complete Endpoint Protection suites
McAfee introduced two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. The suites include McAfee …
Backup large data with Big Cloud
Sterling Data Storage released its largest data backup solution yet — the Big Cloud. It was designed for companies needing to securely store large amounts without sacrificing …
How secure is quantum cryptography?
Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and …
DNS anomaly detection: Defend against sophisticated malware
Not so long ago, the standard way of looking for a malware infection was to simply monitor web traffic. By looking, for example, for HTTP requests to google.com/webhp – …
Plugging the trust gap
Every business and government is dependent upon cryptographic keys and certificates to provide trust for critical communications. These trust technologies underpin the modern …
Week in review: Scanner that identifies malware strains, Twitter offers 2FA
Here’s an overview of some of last week’s most interesting news, reviews and articles: The CSO perspective on healthcare security and compliance Randall Gamby is …
Killer apps: The performance of networked applications
Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …
Fighting cybercrime is on the right track
Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …
IT security pros have trouble communicating with executives
A Hanover Research survey of 131 information security professionals revealed key differences between the way executive and non-executive IT professionals communicate with …
Teens are into online sharing, but are also more privacy-aware
Teens are sharing more information about themselves on social media sites than they have in the past, but they are also taking a variety of technical and non-technical steps …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)