Help Net Security
Most users think content is more important than the device
A global F-Secure survey of broadband subscribers has identified security, privacy and issues relating to the storing and sharing of digital content as key concerns. The …
Detect and shut down rogue mobile apps
To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …
Broadcom introduces 5G WiFi combo chip for smartphones
Broadcom introduced the BCM4335, the first complete 5G WiFi combo chip for smartphones, tablets, ultrabooks and other mobile devices. 5G WiFi, the 5th generation of Wi-Fi …
First holistic security platform unveiled at Black Hat
AccessData released Cyber Intelligence & Response Technology 2 (CIRT 2), a platform that integrates network and computer forensics, malware analysis, large-scale data …
GFI VIPRE Mobile Security Premium now on Android devices
In addition to securing users from more than 10,000 known Android viruses, GFI VIPRE Mobile Security Premium helps them to keep their children safe, protect personal …
Qualys adds IPv6 support to FreeScan
Qualys announced at Security B-Sides Las Vegas that FreeScan – a popular free service that allows organizations to scan web sites or publicly facing IP addresses for …
Cybercriminals use social engineering to extend lifecycle of malware
Android smartphone users remain a lucrative target as the platform currently has 59 percent global market share and is on track to stay the most shipped mobile operating …
Hidden security risks of top mobile apps
Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …
What will the workplace of the future look like?
IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …
Location tracking becomes more attractive
In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …
CryptoAuditor: Privileged user access auditing
SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with …
Novell makes BYOD enterprise ready
Novell announced the availability of ZENworks Mobile Management, which addresses the pain points device administrators and managers face today, including BYOD (bring your own …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised