Help Net Security
IEEE introduces standard for body area networking
IEEE, the world’s largest professional association advancing technology for humanity, today announced a new standard, IEEE 802.15.6TM-2012, optimized to serve wireless …
Week in review: Vulnerable CCTV systems, Pinterest scam toolkits, and top three security concerns for CSOs and CIOs
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: IT candidates should shift career perspectives Enterprises seem to …
MacScan 2.9.3 with Google Chrome and SeaMonkey support released
SecureMac released MacScan 2.9.3, which features tracking cookie detection and cleaning for Google’s Chrome browser. MacScan is the premier Macintosh security program, …
Spam with malicious attachments rising
While the volume of spam messages is falling, the number of messages containing malicious attachments increased, meaning that spam is growing more dangerous even as it becomes …
Password creation policies are the enemy of secure passphrases
Commenting on reports that a security developer has concluded that password-creation policies are the enemy of secure passwords, SecurEnvoy co-founder Steve Watts says that …
Secure data on Android devices with SecureZIP
PKWARE announced SecureZIP Reader for Android, an application that secures enterprise and government data. The SecureZIP Solution secures corporate information that end-users …
Common Vulnerability Reporting Framework updated
The Industry Consortium for Advancement of Security on the Internet (ICASI) announced Common Vulnerability Reporting Framework (CVRF), Version 1.1. Enhancements offer users a …
How executives understand and manage IT risks
Corporate boards and executives are taking risk management seriously but there is still a gap in understanding the link between IT risks and enterprise risk management, …
A marathon of holiday spam
The main spam topics that emerged during the last quarter included the increase in spam during the holidays, mass mailings, malicious attachments and the distribution of …
Leveraging PCI standards to accept mobile payments securely
The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …
Content-related threats cause significant data loss
Content-layer threats – those where an attacker leverages malicious software in what the user believes is harmless content – are posing increasing risks for …
Android security: Protection of Java and native apps
Arxan Technologies enhanced its Mobile Application Protection Suite to include multi-layered, end-to-end protection for Android applications. Given the open source nature of …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)