Help Net Security
Cyber incident reporting in the EU
ENISA took a snapshot of existing and future EU legislation on security measures and incident reporting. Their analysis underlines important steps forward, but also identifies …
Smart Grid Infrastructure & Networking
With contributions from more than 30 experts, Smart Grid Infrastructure & Networking describes cutting-edge technologies for connecting the electrical power …
Week in review: Multi-platform malware, new trends in BYOD, and Google setting up privacy team
Here’s an overview of some of last week’s most interesting news, articles and reviews: 92% of the top 100 mobile apps have been hacked Ninety-two percent of the …
Proactive or reactive: Should that be the question?
For a number of years digital forensics has referred to “the application of computer investigation and analysis techniques to gather evidence suitable for presentation …
Safe Money technology protects online purchases
It’s no secret: most cybercriminals don’t want online fame, they want your money. Kaspersky Lab research shows that each day, more than 1,400 new pieces of banking …
DDoS attacks protection advice from the EFF
Denial of service (DoS) and distributed denial of service (DDoS) attacks are increasingly common phenomena, used by a variety of actors—from activists to governments—to …
IDC finds increased adoption of storage efficiency technologies
The rapid increase in the amount of digital data that needs to be stored is pressuring organizations to increase capital expenditures associated with the acquisition of …
McAfee Mobile Security gets additional privacy features
McAfee announced enhancements to its McAfee Mobile Security software, providing Android smartphone and tablet owners with additional privacy features that help them ensure …
Blackberry ID malware campaign
Websense ThreatSeeker Network intercepted a malware campaign targeting Blackberry customers. These fake emails state that the recipient has successfully created a Blackberry …
USB wireless access point from Sophos secures remote offices
Sophos announced the availability of the Sophos AP 5, its newest wireless access point which acts as an accessory to the Sophos Remote Ethernet Device (RED), creating a …
Changing risk assessment practices
Avoiding the use of software as a service (SaaS) for critical or sensitive data remains a significant form of risk control for many organizations, according to Gartner. But …
A true private cloud from CloudFounders
CloudFounders released CloudFrames, a software platform that converts commodity x86 hardware into a multi-function, ultra-reliable and high performance private cloud. …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous