Help Net Security
Security concerns limit cloud computing use in law firms
Law firm technology managers are tempering their interest in cloud computing with a heightened focus on security, according to an annual survey published in The American …
Fraud prevention and bot protection
Imperva announced the availability of SecureSphere 9.0 and introduced ThreatRadar Fraud Prevention Services and defined a new Web security architecture that not only …
Online social networks: Malware launch pads
With the advent of social networks, the online world has become a virtual society. Social networks serve as seamless communication channels, but at the same time they are …
The rising tide of portable device risks
Responding to research claiming to show that almost a third of executives have rogue mobile devices linked to their organisation’s network, Cryptzone says that this a …
Insecure devices extend shopping risks
Shopping online for the holidays is up, with a 15 point increase in the percentage of Americans who say they will spend more time shopping online than in 2010. But according …
Toolkit cracks encrypted information on iOS 5 devices
ElcomSoft updated the iOS Forensic Toolkit with iOS 5 support for recovering keychain information in iOS 5 devices. Providing near-instant forensic access to encrypted …
Secure replacement for the Certificate Authority System
Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …
Free guide to identity theft prevention
Intersections released the second edition of the Double Trouble ebook, that serves as a guide to identity theft prevention, including real-world scenarios where identity theft …
Check Point extends 3D security with Dynasec acquisition
Check Point announced the acquisition of privately held Dynasec, a provider of Governance, Risk Management and Compliance (GRC) solutions. The acquisition extends Check Point …
Network and security analysis with Trisul
Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …
eFront multiple vulnerabilities
Multiple vulnerabilities have been reported in eFront, according to Secunia. These can be exploited by malicious users to conduct SQL injection attacks and compromise a …
Irresponsible IT disposal methods
Although data security is the primary concern when decommissioning IT equipment, only 61 per cent of companies currently data wipe all of their redundant computers, according …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains