Help Net Security
Check Point stops bot attacks
Check Point announced a new Anti-Bot Software Blade that protects against bots and APTs (Advance Persistent Threats). Check Point helps customers discover bots and prevent …
Modular wireless switch for high-performance networks
Xirrus launched the XR-series Wireless Arrays, the first modular, chassis-based wireless switch portfolio – providing modularity to protect network investments as …
Secure data encryption tunneling for Apple iOS
WatchGuard unveiled their new security technology designed for Apple iOS-enabled devices. Mobile users often need to connect to corporate resources from high-risk locations, …
SpyEye Trojan hijacks mobile SMS security for online fraud
A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …
Wi-Fi users live in a false sense of security
Wi-Fi users in the U.S. are confident that they are taking the right steps to protect themselves when using Wi-Fi devices. In fact, 97 percent of Wi-Fi users recently surveyed …
Best practices for fighting credit card theft
3Delta Systems issued a set of business best practices for protecting customer credit card account information and minimizing corporate exposure to online payment scams. …
This is how Windows get infected with malware
When a Microsoft Windows machine gets infected by viruses/malware it does so mainly because users forget to update the Java JRE, Adobe Reader/Acrobat and Adobe Flash. This is …
Stonesoft a2Cloud: Strong authentication for secure cloud access
Stonesoft announced its new a2Cloud solution which offers secure access to the cloud with usability, minimal administration and low total cost of ownership. a2Cloud delivers …
Data security for Microsoft SharePoint
Imperva announced SecureSphere for SharePoint, a data security solution to help businesses protect sensitive data stored in Microsoft SharePoint. The product addresses the …
ISACA issues COBIT process assessment model
Since COBIT was issued 15 years ago, enterprises worldwide have been using it to assess and improve their IT processes. However, until now there has not been a consistent and …
ISO 27001 documentation toolkit
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better. Poorly written documents …
Apple to launch iCloud on October 12
Apple announced that iCloud, a set of free cloud services, will be available on October 12. iCloud stores your music, photos, apps, contacts, calendars, documents and more, …