Help Net Security
MySQL Troubleshooting
Stuck with bugs, performance problems, crashes, data corruption, and puzzling output? If you’re a database programmer or DBA, they’re part of your life. The trick …
Cybercriminals target Google, LinkedIn and Mass Effect 3 users
During March 2012, GFI Labs documented several spam attacks and malware-laden email campaigns infiltrating users’ systems under the guise of communications purporting to …
Apple patches critical Java flaw
Apple released a critical update for the Java implementation on Mac OS X, for both Lion and Snow Leopard. This update comes almost two months after the release of the …
SQL injection main database security concern among SMBs
GreenSQL surveyed more than six thousand GreenSQL SMB users – IT administrators, DBAs, data security professionals and consultants – about their most critical …
White box cryptography software protection
SafeNet announced a software protection solution that includes white box cryptography. The SafeNet Sentinel portfolio of software licensing and protection solutions now …
Dropcam HD: Smallest Wi-Fi monitoring camera
The Dropcam HD Wi-Fi video monitoring camera comes with automatic night vision and HD-quality video. You can access the live video stream anytime, anywhere – from a …
Developing Enterprise iOS Applications
If you plan to develop iOS applications in a corporate setting – for internal consumption or for sale to end users – you need to read this book. Veteran developer …
New Ice malware attacking Facebook users
Trusteer researchers have discovered a new configuration of the Ice IX malware that attacks Facebook users after they have logged in to their account and steals credit card …
Sophos acquires DIALOGS to provide mobile device protection
Sophos has entered into a definitive agreement to acquire DIALOGS, a privately-held provider of mobile management solutions, headquartered in Germany. DIALOGS, a mobile device …
First 4TB enterprise hard drive
HGST introduced the first 4TB enterprise-class hard drive family, the Ultrastar 7K4000. As the only 4TB 7,200 RPM enterprise-class drive in the industry, and one with a 2.0 …
ISO 27001 implementation: How to make it easier using ISO 9001
ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …
Top concern? Mobile device vulnerability management
Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems