Help Net Security
New 2-factor authentication for the finance industry
OneID released OneID Confirm, a customizable two-factor authentication solution. It is based on the same architecture as the OneID Suite, a set of integrated digital identity …
Belkin releases secure switch for government agencies
Belkin released its Advanced Secure KM Switch and its Advanced 8 & 16-port Secure DVI-I KVM Switches. Both product sets are designed for government agencies and financial …
Microsoft fixes 33 vulnerabilities
Today for Patch Tuesday, Microsoft and Adobe are both coming out with critical fixes for a number of widely installed and attacked programs. Microsoft has 10 bulletins …
Fraudster who hired hackers to manipulate stock prices goes to prison
The central organizer of a worldwide conspiracy to manipulate stock prices through a “botnet” network of virus-controlled computers was sentenced today to 71 …
Internet Explorer best at blocking malware
NSS Labs released the results and analysis from its web browser security comparative evaluating the protection offered by five browsers – Safari 5, Chrome 25/26, …
McAfee launches security service with facial and voice recognition
McAfee announced McAfee LiveSafe, an unlimited cross-device security service that uses facial and voice recognition technology to protect users’ digital lives. The …
Human sensors: How encouraging user reporting strengthens security
Despite the pervasiveness of cyber-attacks threatening the enterprise security today, many organizations are still not taking advantage of their most widely deployed security …
Should the G20 forum discuss Internet security?
The G20 should tackle the vastly important issue of Internet security and “articulate a vision for shaping the Internet economy for the next five to 10 years,” a …
GFI MailArchiver 2013 released
GFI Software announced a new version of its email archiving solution, GFI MailArchiver, which now provides managers with the ability to better understand employee email habits …
The top three threats facing enterprises
Globalization and mobility are fueling opportunities for enterprises today, but they have a nemesis: amplification. As physical perimeters become flexible and the tools and …
How employees use business email
The conventional 9am-5pm working day and five-day working week is a thing of the past for the overwhelming majority of workers at SMBs, according to a new survey on …
Android malware continues to rise
The first quarter of 2013 was marked by firsts for Android malware that add complexity to the Android threat landscape. According to F-Secure Labs, January through March saw …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)