Help Net Security
Symantec IM Manager multiple vulnerabilities
Multiple vulnerabilities have been reported in Symantec IM Manager, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to …
Week in review: Mysql.com hack, QR codes leading to malware and Facebook fixes post-logout tracking cookie
Here’s an overview of some of last week’s most interesting news, interviews, podcasts and articles: Facebook changes raise serious security concerns The last few …
XenServer 6 released
Citrix Systems released XenServer 6. As a key component of the Citrix cloud computing and virtualisation strategy, XenServer 6 brings new optimizations and improved …
SSL Labs launches two Convergence notaries
Convergence is Moxie Marlinspike‘s attempt to introduce fresh thinking into the debate about PKI, certificate authorities, and trust. A hint of what was in the works was …
Critical vulnerabilities triple in 2011
Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …
Smartphone users choose convenience over security
In a revealing survey of smartphone and tablet users, the majority polled admit to not password protecting their mobile devices despite keeping them logged in to sensitive …
Content protection for Android devices
Elliptic Technologies expanded its DTCP-IP content protection offering to include support for Android used in a myriad of consumer devices, including DLNA enabled smartphones …
Mail-borne polymorphic malware soars
Approximately 72% of all email-borne malware in September could be characterized as aggressive strains of generic polymorphic malware, says Symantec in its September 2011 …
First enterprise mobile DLP solution
Zenprise announced its Mobile Enterprise Security Framework including the mobile DLP solution for managing and securing the growing number of personally owned devices entering …
Amazon introduces Silk, a cloud-accelerated web browser
Amazon Silk introduces a “split browser” architecture that accelerates the power of the mobile device hardware by using the computing speed and power of the Amazon …
RSA Conference Europe full keynote line-up
RSA Conference announced its complete line-up of keynote speakers for the 12th annual RSA Conference Europe, taking place from 11th-13th October 2011 in London. The Conference …
WAN and network optimization API for iOS
Circadence announced an application programming interface (API) enabling WAN optimization for Apple iOS applications. The API installs into Apple mobile applications or apps …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)