Help Net Security
Despite concerns, smartphone hotspot adoption grows
Sixty-two percent of smartphone users leverage their devices’ hotspot capabilities, an increase of nine percent since May 2012, according to a new uSamp survey of more …
EU proposes to make data breach disclosure mandatory
The European Commission has today announced the launch of new proposals that include a requirement for EU member states to appoint an independent CERT and pivotally calls for …
F-Secure Client Security updated with threat detection technology
As the cost of cybercrime continues to soar, affecting businesses around the world, F-Secure is introducing the latest version of its corporate endpoint security product, …
BYOD is increasing IT frustration and loss of control
IT is concerned about rising mobility costs and feeling frustration and loss of control over BYOD, according to iPass and MobileIron. The majority of survey respondents (57 …
Aegis Bio: Encrypted USB 3.0 drive with biometric fingerprint access
Apricorn announced the Aegis Bio 3.0, a software-free biometric USB 3.0 drive that safeguards data with secure fingerprint access and military grade 265-bit AES-XTS hardware …
Information security: Understanding a global picture in a local context
“Think globally, act locally” is a phrase now cliche because it expresses an incontrovertible and immediately graspable truth. The global/local concept applies …
Cyber risk perceptions revealed
A survey of perceptions about cyber risk found that among corporate executives, more are concerned about cyber threats than about other major business risks. More than 85% of …
Nearly a third of all computers are infected with malware
PandaLabs released its annual security report which details an extremely interesting year of data theft, social networking attacks and cyber-warfare. The most devastating …
RedSeal 6.5 supports BYOD, SIEM and risk metrics
RedSeal Networks released the latest version of the RedSeal Platform to protect companies and government agencies from attacks across the network. “In an ideal world, …
Examining the Nap malicious downloader
We recently encountered a stealthy malware that employs extended sleep calls to evade automated analysis systems capturing its behavior. It further makes use of the fast flux …
List of products affected by the vulnerable Broadcom UPnP stack
Recently, DefenseCode researchers have uncovered a high-risk Broadcom UPnP stack remote root vulnerability. The vulnerability is located within the wanipc and wanppp modules …
Fear of government snooping hinders cloud adoption
Almost half of IT experts are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, according to Lieberman …
Featured news
Resources
Don't miss
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)
- Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
- Product showcase: Go beyond VPNs and Tor with NymVPN
- CISOs must speak business to earn executive trust