Help Net Security
Cisco expands data center networking portfolio
As Internet traffic volumes increase at exponential rates (by 2013 it’s predicted that there will be 56 exabytes crossing the internet per month) the data centers that …
McAfee detects kernel-mode malware
McAfee announced Deep Defender, which is capable of detecting nearly all kernel-mode malware. This level of security is possible with McAfee DeepSAFE technology because its …
Shinken: IT system and application monitoring
Shinken can monitor all IT from systems to end user applications. In case of a failure, it can alert the operation engineers so they can repair it. It has the same …
Fingerprint sensors for mobile ID devices
DigitalPersona launched a new generation of biometric fingerprint sensors designed specifically for the growing market of battery-powered mobile identification devices. The …
WatchGuard unveils new line of virtualized firewalls
WatchGuard is extending its line of UTM appliances to the virtual world. Designed for a VMware hypervisor environment, the new WatchGuard XTMv series of virtual firewalls …
Twitter protects freedom of speech and privacy of users
When LulzSec member Sabu recently answered a lot of questions on an impromptu Q&A session on Reddit by posting the answers on his Twitter account, he was asked why he …
Free Metasploit Community Edition released
Rapid7 launched Metasploit Community Edition: a new free addition to the Metasploit family of software solutions, which help security and IT professionals identify and …
Information theft still a serious threat to global business
Fraud remains predominantly an inside job, according to the Kroll Annual Global Fraud Report. The study shows that 60 percent of frauds are committed by insiders, up from 55 …
Mitigating the BEAST attack on TLS
During the summer rumours about a new attack against SSL started circulating. Then Opera released a patch, but made no comment about what it was patching. Eventually enough …
Huge threats still targeting power grids
One year ago, the Stuxnet virus had just been discovered. A year’s worth of analysis still has not unlocked its secrets but it has had a profound influence upon the …
IT execs view security and privacy as top priority
New and complex IT risks and changing business priorities challenge today’s IT leaders, according to a new survey from Protiviti. The results of the study reveal six …
Password misuse at root of hacking
48 percent of IT security professionals surveyed have worked for organizations whose network has been breached by a hacker, according to Lieberman Software. The survey paints …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems