Help Net Security
Week in review: IE zero-day patched, Flame C&Cs reveal more malware, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Google adds Do Not Track support to Chrome The next official release of …
Ex-CME programmer admits to stealing source code
A former senior software engineer for Chicago-based CME Group pleaded guilty to theft of trade secrets for stealing computer source code and other proprietary information …
Key components for mobile device management of BYOD
The Cloud Security Alliance (CSA) Mobile Working Group released a research report identifying 17 key elements that are critical for organizations to consider for the full …
Moving federal mission-critical applications to the cloud
As federal agencies are making cloud progress, the early-adopters that are moving their mission-critical applications to the cloud are realizing cost savings and improved …
SUSE Manager update streamlines Linux management
SUSE released SUSE Manager 1.7 of its systems management solution for enterprise Linux environments. SUSE Manager’s capabilities help enterprises to comprehensively …
ActivClient Mobile SDK for iOS released
HID Global released the ActivClient Mobile SDK for iOS. Application developers, enterprises, government entities and other organisations will benefit from this SDK with …
Manage firewall policies by applications with SecureApp
Tufin Technologies released SecureApp, developed to address what firewall administrators cite as one of their biggest challenges: managing the network connectivity of …
Comodo updates its Endpoint Security Manager
Comodo released a new edition of Comodo Endpoint Security Manager designed to assist businesses with locking down and centrally managing their laptop, desktop and server …
Secure smart card reader for government applications
Belkin announced the first USB smart card and common access card (CAC) reader specifically designed for government applications. Offering the broadest range of smart card …
Deconstructing hacktivist operations and tools
Imperva released its September Hacker Intelligence report, which details the latest methods deployed by hackers to execute DDoS attacks by analyzing the technical tools and …
Darwin’s theory applies to malware
G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …
Dedicated sensor for Wi-Fi network monitoring
Fluke Networks announced a new dedicated sensor for Wi-Fi network monitoring that eliminates the need for Ethernet cabling, and reduces the cost by up to two thirds in …