Help Net Security
Wireless Network Security A Beginner’s Guide
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner’s Guide discusses the many attack vectors …
When syncing sinks your browser
Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …
AuthenTec releases Eikon mini USB fingerprint reader
AuthenTec introduced the Eikon mini USB fingerprint reader. The ergonomically designed Eikon mini integrates AuthenTec’s AES2660 smart fingerprint sensor and was …
iOS and Android security solutions from F-Secure
F-Secure Mobile Security, which provides protection for Android phones and tablets, can now be purchased on Google Play. F-Secure Child Safe, which is a browser for parental …
Cybercrime goes mobile
Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …
Malware detection for Nessus vulnerability scanner
Tenable announced new malicious process detection capabilities on Windows computers for the Nessus vulnerability scanner. This new functionality complements and extends AV …
Juniper Networks enhances its Mykonos Web Security software
Juniper Networks announced major platform enhancements to its Mykonos Web Security software. The new release provides 30 new features and enhancements that strengthen …
Advanced Internet Protocols, Services, and Applications
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions …
UFED Touch: Field-ready mobile forensics solution
Cellebrite launched UFED Touch, a solution for investigators to extract and decode digital evidence from mobile devices including smartphones, legacy phones, portable GPSs and …
17% of the world’s PCs are unprotected
Lack of consumer PC protection is a global problem. In a study that analyzed data from voluntary scans from an average of 27-28 million computers per month, McAfee researchers …
Security posture management from FireMon
FireMon announced Security Manager 6.0, a security policy and posture management solution that integrates risk analysis with configuration management, enforcement and auditing …
(IN)SECURE Magazine issue 34 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 34 has been released today. Table of contents: …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface