Help Net Security
Photos: The look and feel of SecurityByte 2011, part 2
Help Net Security attended this India’s largest information security conference in Bangalore – SecurityByte 2011. The first photo gallery is here. A group photo of …
Multi-layer fraud prevention from IronKey
IronKey introduced the next generation of online banking security: an integrated platform of multiple security controls. This approach reduces the risk of online banking fraud …
SplashID Enterprise: Centralized control of password administration
SplashData announced SplashID Enterprise 2.0, featuring updated Windows and Mac OS X clients, new mobile apps and a web-based application that enable enterprise users to …
Log Management 10 comes with compliance enhancements
Ipswitch announced its log management software solution, WhatsUp Log Management 10 which provides out-of-the-box security and compliance for businesses of all sizes. The …
HTML5-based mobile security platform
AirWatch released an HTML5-based MDM platform. By leveraging HTML5, AirWatch’s management console is now even more accessible from any web-connected device, regardless …
Cybercriminals impersonating government agencies
GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …
Drupal Author Pane module security bypass weakness
A weakness has been reported in the Author Pane module for Drupal, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …
How to deal with Internet security threats
How to use the Internet while staying secure has always been a concern for businesses. Over the last couple of years there have been many changes in the Internet threat …
Mobile malware criminal command-and-control activity
Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is …
Identity theft protection tips for students
College students are especially attractive targets for identity thieves because they have unblemished credit records, making it easier for thieves to take out loans in their …
Photos: The look and feel of SecurityByte 2011
Help Net Security attended this India’s largest information security conference in Bangalore – SecurityByte 2011. The opening ceremony with conference founder …
Network encryption starter kit
Certes Networks announced a Network Encryption Starter Kit which enables organizations to experience the full benefits of multi-layer encryption. “Many enterprises and …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems