Help Net Security
Encryption for Microsoft Office 365
CipherCloud unveiled CipherCloud for Office 365, a cloud encryption gateway that transparently encrypts all email message, calendar, and contact data stored in …
When employees leave so does your data
One in three (32%) employees have taken or forwarded confidential information out of the office on more than one occasion, according to Iron Mountain. When people change jobs, …
D-Link releases Cloud Camera 5000 with pan and tilt
D-Link announced its D-Link Cloud Camera 5000 (DCS-5222L), which offers a round-the-clock surveillance solution with 720p HD recording, smooth pan/tilt and digital zoom …
Metasploit Pro increases vulnerability management efficiency
Rapid7 introduced the means to increase vulnerability management efficiency by leveraging intelligence from its penetration testing solution, Metasploit Pro, to validate …
Real-time fraud prevention with PhoneID Contact
TeleSign announced the newest product in the PhoneID suite, which helps online businesses block fraud by delivering name and address details based on a phone number. PhoneID …
Energy grids are prime attack targets
The electrical power grid is the backbone on which everything else depends. A cybercriminal could debilitate a major city by a single targeted attack on the energy grid and …
Cyber espionage campaign in the Middle East
Kaspersky Lab researchers announced the results of a joint-investigation with Seculert regarding Madi, an active cyber-espionage campaign targeting victims in the Middle East. …
Most companies block cloud services
While 80 percent of companies do not allow their employees to use cloud based file synchronization services, 70 percent of companies would use these services if they were as …
Oracle releases 87 security fixes
The Oracle Critical Patch Update (CPU) Advisory for July 2012 contains 87 security fixes for various products across their portfolio. This advisory is a bit of déjà vu …
Rapid password cracking using Pico FPGA-based hardware
ElcomSoft updated two password recovery tools, employing Pico FPGA-based hardware to greatly accelerate the recovery of passwords. Users of Elcomsoft Phone Password Breaker …
MPs call for cyber war on Britain’s cyber enemies
Britain’s security and intelligence agencies have been urged by MPs to engage in cyber attacks against enemy states in a report released by The Intelligence and Security …
Real-time IP address blocking of DDoS attacks
Corero Network Security is extending its capabilities with the launch of ReputationWatch. It will identify in real-time known malicious entities and block access to …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)