Help Net Security
New QuickTime fixes a number of security vulnerabilities
In a new security advisory, Apple addressed a number of vulnerabilities in QuickTime for Windows and announced a new version – 7.7.3. This is the list of security …
Social networking is the #1 risk to information security
The consumerisation of IT has made security far more difficult to manage according to research published by McAfee at its Security Summit in London. This is exemplified by the …
Trusted deployment of personal data to boost growth in the European economy
The effective and trusted deployment of personal data could be a boon to consumers and a source of massive growth in the European economy, but only if public and private …
Updated SkyBox risk and compliance management solutions
Skybox Security added new capabilities to Firewall Assurance 6.5 and Network Assurance 6.5 that make it easier for security managers to see, analyze and take action to secure …
Symbian malware scene far from dead
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Symbian threats. Despite …
Android malware continues to dominate the mobile threat landscape
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Android threats. As expected, …
New IronKey hardware-encrypted secure flash drives
Imation Corp. announced the availability of two new IronKey hardware-encrypted rugged flash drives – S250 and D250 . The IronKey flash drives deliver powerful protection …
IT in the organization: four possible scenarios for the future
The changing shape of IT is causing CIOs to question the role of IT in the organization. As businesses confront global economic uncertainty, changing market dynamics and …
Adobe Reader 0-day exploit sold for $50,000
The good news is that the exploit costs $50,000 which limits the purchase of it to defense contractors, nation states and some criminal organizations that may be able to …
Video demonstration: New Adobe Reader zero-day exploit
Russian based security company Group-IB announced a new zero day vulnerability in Adobe Reader 10 and 11. According to their research, the exploit bypasses Reader’s …
New batch of Trusted Computing Group certified products
Trusted Computing Group has recently certified four products, including a Trusted Platform Module (TPM) and three products supporting the group’s security automation …
YubiKey NEO authentication token released
Yubico announced the production launch of the YubiKey NEO, a new authentication token that features Near Field Communications (NFC) technology, asymmetric cryptography support …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems