Help Net Security
Fake products pose real dangers
It’s no surprise that many high-end luxury items, such as handbags and watches, have had its share of knock-offs over the years, mainly because they’re often …
IBM appliance controls social media risks
IBM announced a new class of network security appliance that delivers a more granular view of a company’s security posture and a simplified security management …
Deep Freeze 7.5 released
Faronics released Deep Freeze 7.5, which provides full workstation protection by “freezing’ the computer’s configuration and preventing accidental or …
SANS announces line-up for digital forensics event
SANS Institute has announced its roster of speakers presenting at the 3rd annual European Digital Forensics and Incident Response Summit (DFIR) in Prague on the 7th of …
British public unaware of cyber sporting scams
Watching this summer’s sporting escapades is something most of us will relish, but are we taking the right precautions to protect our electronic devices from the …
Overcoming the hacker hurdle during the Olympics
During the Beijing Olympics it’s reported there were upwards of 12 million “cyber security incidents” per day . Hacking has evolved tremendously since …
Sophos releases free anti-virus app for Android
Sophos announced Sophos Mobile Security, a free lightweight anti-virus app that protects Android devices against malware, privacy issues and hardware loss – without …
1,500 severe security events detected on Black Hat WLAN
The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent …
Wargame examines the future of US infrastructure
Booz Allen Hamilton concluded the first-ever wargame simulation examining creative infrastructure initiatives and solutions that factor in US transportation needs by the year …
Five steps for a secure cloud transition
Almost every type of SMB is examining its current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest …
Security storage app for iOS and Android devices
TrustPort launched Portunes, a freeware security storage app that runs on iOS and Android devices. Portunes is an application protecting sensitive data like informationon …
The Computer Incident Response Planning Handbook
The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware