Help Net Security
YubiKey NEO authentication token released
Yubico announced the production launch of the YubiKey NEO, a new authentication token that features Near Field Communications (NFC) technology, asymmetric cryptography support …
Secure View 3 recovers deleted data from Android phones
Susteen’s Secure View 3 digital forensics product is now able to recover deleted data from the large majority of Android phones. Law enforcement, military and government …
Infographic: “How companies track you on the Web”
Veracode’s new infographic illustrates how privacy transference has evolved into a major problem for consumers who willingly give information to businesses online, but …
How to stay secure in a changing world
In Sir Isaac Newton’s time there were three laws of motion, which dominated the scientific view of the world. While he, and his scientific peers, might have had many …
Alarming number of merchants unaware of PCI DSS
The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the PCI DSS, a ControlScan …
Secure data-at-rest and data-in-motion on iOS and Android
Companies are moving their core business operations to mobile apps. App developers are at the center of this transformation and must deliver great apps quickly while ensuring …
Seagate Backup Plus gets USB 3.0
Seagate introduced SuperSpeed USB 3.0 to Backup Plus storage for Mac. This new interface means faster transfer of data, so you can backup more quickly, up to 10x that of USB …
Lock your Mac with QuickLock
QuickLock is a customizable way to lock your Mac. Unlike OSX’s hot corners, QuickLock works with a simple keyboard shortcut or menubar click, and never gets in the way …
ASUS unveils RT-N12HP wireless router
To serve home and office users who need wider wireless coverage, the ASUS RT-N12HP high-power wireless-N300 router employs detachable 9dBi antennas and a unique hardware …
Mac OS X and iOS Internals
Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded in mystery. Cocoa and Carbon, …
Most Android malware are SMS Trojans
Android versions 2.3.6, or ‘Gingerbread’, and 4.0.4, also known as ‘Ice Cream Sandwich’ were the most popular Android targets among cybercriminals in …
Trust in the cloud or trust in the phone: What next for mobile payments?
Thales looks at the approaches for the successful mass adoption of mobile payments among issuers, card schemes, acquirers, merchants and consumers and asks whether the arrival …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online