Help Net Security
ENISA summarizes 120 threat reports, identifies top trends
The EU’s cyber security agency ENISA has published the first Cyber Threat Landscape analysis of 2012, summarizing over 120 threat reports. The report identifies and …
Intel and McAfee to deliver consumer-centric online security
Together with Intel, McAfee is redefining the consumer security experience with a focus on safeguarding consumer devices, securing personal data and protecting identities …
Seagate releases storage device with Smart TV app
Seagate announced the first storage device to feature a Smart TV app for access to files on the big screen. Seagate Central delivers automatic backup for the entire home, …
Vulnerability management in the cloud from Dell SecureWorks
Dell SecureWorks announces a new Vulnerability Management Service (VMS) and a new Web Application Scanning (WAS) Service for the Cloud. These add-on Cloud security solutions …
The importance of data normalization in IPS
To fully comprehend the importance of data normalization in an Intrusion Prevention System, it is first necessary to understand what data normalization is and what it does, …
Toshiba unveils SSD with cryptographic-erase and self-encryption
Toshiba announced new enterprise SAS solid state drives (SSD), mobile SATA hard disk drives (HDD), including self-encrypting drive (SED) models in both product categories, and …
SuperSpeed USB (USB 3.0) at 10 Gbps with new capabilities
The USB 3.0 Promoter Group announced development of a SuperSpeed USB (USB 3.0) enhancement that will add a much higher data rate, delivering up to twice the data through-put …
Lenovo and EMC to bring Network Attached Storage to SMBs
Lenovo and EMC have completed the formation of LenovoEMC Ltd, the joint venture with a wider strategic partnership in industry standard servers and networked storage …
Keycard: Unlock your Mac using an iOS device
Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …
Training Guide: Installing and Configuring Windows Server 2012
Designed to help enterprise administrators develop real-world, job-role-specific skills, this Training Guide focuses on deploying and managing core infrastructure services in …
Week in review: IE zero-day used in active attacks, fraudulent digital certificate for Google domains revoked
Here’s an overview of some of last week’s most interesting news, reviews and articles: Database hacking: The year that was Have you ever been to the Privacy Rights …
Microsoft to release seven advisories on Tuesday
The first Microsoft Patch Tuesday of 2013 includes 7 advisories (MS13-001 – MS13-007), two of which are listed as critical because they can be executed remotely. One of …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems