Help Net Security
F-Secure launches Internet Security 2012
F-Secure launched Internet Security 2012, an improved version of its online safety offering. It is easy to use and the new Launch pad provides convenient access to all parts …
SANS offers discount for London 2011 training event
Even with the tough economic conditions last year, over 400 students attended SANS London 2010 and that figure is likely to increase for 2011 as SANS unveils its largest ever …
Unified identity federation for cloud applications
SafeNet announced that its SafeWord 2008 strong authentication management platform, along with SafeNet Authentication Manager (SAM), now provides a seamless and extensible …
Best practices for reporting malware
Nonprofit anti-malware organization StopBadware released of its new Best Practices for Reporting Badware URLs, which prescribe specific steps for reporting different types of …
Consolidated security appliances for application service and SaaS providers
Fortinet announced three new consolidated security appliances for the mid-range market segment that includes medium size businesses, enterprise customers, application service …
Massive international identity theft operation shut down
111 individuals have been indicted in the largest identity theft takedown in U.S. history. The defendants, members of five organized forged credit card and identity theft …
163 new advanced evasion techniques discovered
Stonesoft announced it has delivered 163 new advanced evasion technique (AET) samples for global vulnerability coordination. The new samples include AETs over a number of …
Android VPN client launches via fingerprint authentication
AuthenTec introduced a security solution that combines VPN client security with fingerprint recognition for Android smartphones and tablets. The QuickSec Mobile VPN Client 2.0 …
Most social networks users don’t keep up with privacy settings changes
The proliferation and usage of mobile devices is exponentially growing, as is consumers’ dependence on the Web, causing many to lose sight of the importance of keeping …
Week in review: Patching strategies, HTC Android privacy flaw, and how well do you know SSL?
Here’s an overview of some of last week’s most interesting news, videos, articles and podcasts: Serious disconnect between security perceptions and reality The …
Top DDoS attacks of 2011
There has been an increase in newer, intelligent application-layer DDoS attacks that are extremely difficult to identify “in the cloud,” and often go undetected …
MagicTree: Data management for penetration testers
Have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware