Help Net Security
Smart Grid Infrastructure & Networking
With contributions from more than 30 experts, Smart Grid Infrastructure & Networking describes cutting-edge technologies for connecting the electrical power …
Week in review: Multi-platform malware, new trends in BYOD, and Google setting up privacy team
Here’s an overview of some of last week’s most interesting news, articles and reviews: 92% of the top 100 mobile apps have been hacked Ninety-two percent of the …
Proactive or reactive: Should that be the question?
For a number of years digital forensics has referred to “the application of computer investigation and analysis techniques to gather evidence suitable for presentation …
Safe Money technology protects online purchases
It’s no secret: most cybercriminals don’t want online fame, they want your money. Kaspersky Lab research shows that each day, more than 1,400 new pieces of banking …
DDoS attacks protection advice from the EFF
Denial of service (DoS) and distributed denial of service (DDoS) attacks are increasingly common phenomena, used by a variety of actors—from activists to governments—to …
IDC finds increased adoption of storage efficiency technologies
The rapid increase in the amount of digital data that needs to be stored is pressuring organizations to increase capital expenditures associated with the acquisition of …
McAfee Mobile Security gets additional privacy features
McAfee announced enhancements to its McAfee Mobile Security software, providing Android smartphone and tablet owners with additional privacy features that help them ensure …
Blackberry ID malware campaign
Websense ThreatSeeker Network intercepted a malware campaign targeting Blackberry customers. These fake emails state that the recipient has successfully created a Blackberry …
USB wireless access point from Sophos secures remote offices
Sophos announced the availability of the Sophos AP 5, its newest wireless access point which acts as an accessory to the Sophos Remote Ethernet Device (RED), creating a …
Changing risk assessment practices
Avoiding the use of software as a service (SaaS) for critical or sensitive data remains a significant form of risk control for many organizations, according to Gartner. But …
A true private cloud from CloudFounders
CloudFounders released CloudFrames, a software platform that converts commodity x86 hardware into a multi-function, ultra-reliable and high performance private cloud. …
BYOD 2.0 and spotting the next big trend
In the 1960s and 70s the IT department was seen as a secret place ruled by powerful niche experts. They had total control of the department and who could access systems. The …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised