Help Net Security
Secure smart card reader for government applications
Belkin announced the first USB smart card and common access card (CAC) reader specifically designed for government applications. Offering the broadest range of smart card …
Deconstructing hacktivist operations and tools
Imperva released its September Hacker Intelligence report, which details the latest methods deployed by hackers to execute DDoS attacks by analyzing the technical tools and …
Darwin’s theory applies to malware
G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …
Dedicated sensor for Wi-Fi network monitoring
Fluke Networks announced a new dedicated sensor for Wi-Fi network monitoring that eliminates the need for Ethernet cabling, and reduces the cost by up to two thirds in …
RSA launches incident response services
RSA introduced RSA Advanced Cyber Defense Services (ACD), a new portfolio of services, including incident response and breach readiness assessment, are designed to assist an …
Passwords Plus for Mac OS X released
DataViz announced the availability of Passwords Plus for Mac OS X, plus updated versions for iOS and Windows. Passwords Plus stores and protects PINs, passwords, and other …
Vendor application security testing program from Veracode
Veracode announced the Vendor Application Security Testing (VAST) program, which provides an independent, automated, and outsourced program to help enterprises reduce the …
Interoperable standard for financial data exchange
The IFX Forum has published version 1.9 of IFX, its open, interoperable standard for financial data exchange. The IFX Forum is an international non-profit industry association …
(IN)SECURE Magazine issue 35 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 35 has been released today. Table of contents: …
Phishers continue to target legitimate websites
Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures …
Real-world software security initiatives study
Cigital announced the fourth major release of the Building Security In Maturity Model (BSIMM) study. This release describes real-world data from fifty-one firms with active …
One third of European organizations refuse to implement BYOD
Imation released research which shows that German workers are most likely to follow rules around secure remote working, with 50% of German respondents saying that they always …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems