Help Net Security
Apple security update fixes QuickTime vulnerabilities
Apple just released an advisory addressing 17 security flaws in QuickTime Media Player. The update is rated critical as several of the fixed vulnerabilities can be used to …
Inside Windows Debugging
Rethink your use of Windows debugging and tracing tools, and use Inside Windows Debugging to learn how to make them a key part of test-driven software development. Led by a …
Environmentally hardened encryption appliance
Certes Networks announced the introduction of their newest encryption appliance, the CEP5 LC. Developed for organizations requiring secure traffic flows to remote locations, …
Zeus exploits users of Facebook, Gmail, Hotmail and Yahoo!
Trusteer discovered a series of attacks being carried out by a P2P variant of the Zeus platform against users of Facebook, Google Mail, Hotmail and Yahoo – offering …
Adobe privacy solution for advertisers and publishers
Adobe announced enhancements to Adobe TagManager, creating a flexible privacy solution that helps digital advertisers and publishers give consumers notice and control over how …
Forensic access to iCloud backups
iPhone users have several options to back up the content of their devices. They can backup information stored in their device such as contacts, pictures, call logs and data …
McAfee and Intel protect the critical infrastructure together
McAfee announced a collaboration with Intel to better protect the world’s energy utility ecosystem, including generation, transmission and distribution, from increased …
Microsoft shows cloud computing security benefits
Small and midsize businesses (SMBs) are gaining significant IT security benefits from using the cloud, according to a new Microsoft study in five geographies. The study shows …
Getting started with RFID
If you want to experiment with radio frequency identification (RFID), this book is the perfect place to start. All you need is some experience with Arduino and Processing, the …
Android remote systems administration tools
Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs …
Qualys adds security experts to CTO/CSO advisory board
Qualys announced today the newest additions to its CSO/CTO Advisory Board. The four new members join information security leaders from eBay, Goldman Sachs, Microsoft, PayPal, …
Cloud data encryption for Hosted Exchange
Vaultive announced Vaultive for Hosted Exchange, a cloud data encryption solution that enables customers to encrypt data-at-rest and data-in-use within the Hosted Microsoft …
Featured news
Resources
Don't miss
- Brakeman: Open-source vulnerability scanner for Ruby on Rails applications
- Incident response lessons learned the hard way
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work