Help Net Security
Samsung introduces suite of security features for Android
The Samsung Galaxy Note and Galaxy Tab 7.7 will be the first Samsung Approved for Enterprise (SAFE) devices provided to consumers who wish to use their own mobile devices in …
Highly secure cloud-based collaboration
Exostar announced ForumPass 5, a multi-enterprise project collaboration service offering built on Microsoft SharePoint 2010. It operates within Exostar’s Community …
The anatomy of the Gameover Zeus variant
The “Gameover” malware is a relatively new, “private” version of ZeuS. Support for the distributed command and control (C2) tools, integrated into the …
Easy ways to protect your privacy and data
In spite of one high profile computer security breach after another, many people are still not employing even the most basic safeguards to protect their privacy and their …
Dell delivers new storage backup
Dell announced advancements in its Fluid Data architecture that enable customers to quickly adapt to the changing demands of their organizations and increase automation for …
Smart network cloud application platform
NETGEAR announced its Smart Network Cloud Application Platform, a new technology platform that enables consumers to purchase and download apps from the cloud for their home …
Splunk Enterprise 4.3 released
Splunk Enterprise, a software for collecting, indexing and harnessing machine data, reached version 4.3. “All kinds of companies are using Splunk to harness the value in …
Key security developments for 2012
Kroll Ontrack, the leading provider of data recovery, electronic discovery, and information management products and services, today announced the most important technology …
IPAM and DNSSEC key management integration
The Thales nShield hardware security module (HSM) is now integrated with the Infoblox DNS platform to enable the deployment of DNSSEC. This joint solution addresses common …
The Linux Command Line
Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, …
Microsoft releases seven bulletins
2012’s first Patch Tuesday has seven bulletins, including the postponed bulletin from December 2011 that addresses the BEAST style information disclosure. Talking about …
Is your online bank vulnerable to currency rounding attacks?
In the 12+ years of doing penetration tests against various critical environments, we’ve seen numerous online banking servers and found all sorts of vulnerabilities in …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems