Help Net Security
BYOD security for cloud Wi-Fi access
AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, …
China escalating Tibetan cold war into cyberspace
AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a …
Machine Learning for Hackers
If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …
Microsoft patches seven distinct vulnerabilities
We have a total of six bulletins from Microsoft this month, addressing seven distinct vulnerabilities. It’s a pretty light month, but all of your focus should be on …
Apple fixes 83 vulnerabilities in Safari
Apple issued a patch for Safari, fixing 83 vulnerabilities, 72 of which were rated critical. Since Safari and Chrome both use WebKit, the open-source browser engine, it allows …
Data protection risks on mobile devices
An increasing number of professionals (80 percent) work remotely and rely on personal devices such as smartphones (63 percent), iPads (30 percent) and laptops (80 percent) to …
Dell to acquire SonicWALL
Dell has signed a definitive agreement to acquire SonicWALL, a provider in advanced network security and data protection. SonicWALL expands Dell’s growing security …
Eliminating the need for multiple passwords
OneID announced the developer release of its service that eliminates the need for multiple usernames and passwords. Using the OneID service, consumers can sign in to websites …
Big gaps in backup plans
Small businesses are using a variety of technologies to back up data including some antiquated methods that leave the backup process incomplete and susceptible to information …
LogRhythm and Solera Networks announce a technology partnership
LogRhythm and Solera Networks announced a technology partnership to provide customers with network visibility, security and situational awareness by combining …
New online banking fraud schemes target mobile users
Trusteer uncovered two online banking fraud schemes designed to defeat one time password (OTP) authorization systems used by many banks. Unlike a previous attack Trusteer …
iOS 5 Programming Cookbook
Now you can overcome the vexing, real-life issues you confront when creating apps for the iPhone, iPad, or iPod Touch. By making use of more than 100 new recipes in this …
Featured news
Resources
Don't miss
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
- Microsoft introduces protection against email bombing