Help Net Security
Security for virtualized and cloud infrastructures
WatchGuard announced the beta version of XTMv, its next-generation security UTM product as a virtual appliance which provides network security and protection of applications …
SDK advances face recognition for large surveillance systems
Neurotechnology announced VeriLook Surveillance 2.0, a SDK for biometric face identification using live video streams from single or multiple high-resolution digital …
EFF helps travelers defend their data privacy
Anytime you travel internationally, you risk a broad, invasive search of your laptop, phone, and other digital devices – including the copying of your data and seizing …
Firefox 9 closes security holes
Mozilla released Firefox 9 that fixes several security and stability issues. Crash when plugin removes itself on Mac OS X FireBreath developer Richard Bateman reported a crash …
Exostar updates identity management solution
Exostar, whose cloud-based solutions enable secure business-to-business collaboration, announced it has expanded its Managed Access Gateway (MAG) identity management service …
First EU report on maritime cyber security
ENISA published the first EU report ever on cyber security challenges in the Maritime Sector. This principal analysis highlights essential key insights, as well as existing …
OWASP ModSecurity Core Rule Set 2.2.3 released
ModSecurity is a web application firewall engine that provides very little protection on its own. In order to become useful, ModSecurity must be configured with rules. In …
Sophos enhances mobile device management platform
Sophos announced Mobile Control 2.0, a mobile device management solution that supports iPhones and iPads, Android phones and tablets, Windows Mobile devices and RIM BlackBerry …
Week in review: Multiple dimensions of corporate espionage, 2012 biggest security threats, and avoiding malware behind QR codes
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Rise of unencrypted cards 71 percent of merchants were found to store …
Biggest security threat for 2012? Privacy violations
Cyber-espionage, along with privacy violations and social networking attacks facilitated by the increased use of mobile and tablet devices, will be the source of increased …
The risks of online shopping
More people than ever are using their personally owned smartphones to send and receive e-mails, browse the Internet, shop online and visit social media sites – as well …
Key security threats in the coming year
The widespread adoption of mobile devices, proliferation of applications and growth of cloud computing are helping accelerate business innovation and social benefits. However, …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025