Help Net Security
Cisco improves the security of the voice network
As IT managers look for ways to thwart voice fraud and other types of malicious activity, Cisco announced the Cisco UC Gateway Services API, a Web-based API that could play a …
McAfee introduces network IPS for data centers
McAfee announced new capabilities to its Network Security Platform, including a scalable 80 Gbps IPS solution that has been validated at over twice the performance capability …
Microsoft releases seven security updates
This month, Microsoft released seven bulletins, three critical and four important, that addressed a total of 23 vulnerabilities. MS12-029 is the bulletin that should be …
Security and management for iOS
3LM released version 3.0 of its security and management platform which extends 3LM’s Mobile Device and Application Management (MDAM) support to any Android OS-based …
ForeScout and Fiberlink fortify mobile security
ForeScout and Fiberlink announced a partnership to deliver an integrated MDM and NAC offering. The new product, ForeScout MDM powered by MaaS360, combines cloud-based mobile …
Online banking fraud insurance scam
In their never ending effort to devise new schemes that defraud online banking accounts, criminals have come up with a scam that is both simple and extremely believable …
Altus Mobile: Mobile location surveillance
Polaris Wireless announced Altus Mobile, a mobile location surveillance application, providing accurate mass location of all mobile devices operating on a cellular network, …
Cybercriminals are exploiting users of social networking sites
In April, cybercriminals were seen exploiting users of major social networking sites in order to spread malware and spam surveys, according to GFI Software. “In the same …
The personal cloud will eclipse the PC
The personal cloud is poised to eclipse the PC as the hub of consumers’ digital lives by 2014 as rapid growth in the use of apps and services introduces a new paradigm …
Healthcare concerns over data loss increase
While approaches to patient data protection have evolved over the past several years, the aggressive transition to electronic health records (EHR) and the consumerization of …
Webbots, Spiders, and Screen Scrapers, 2nd Edition
There’s a wealth of data online, but sorting and gathering it by hand can be tedious and time consuming. Rather than click through page after endless page, why not let …
Government workers unprotected against visual data leakage
Oculis Labs released results from its “Government Worker Privacy” survey on privacy risks for mobile workers. 104 people were randomly surveyed at this …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)