Help Net Security
ISO 27001 documentation toolkit
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better. Poorly written documents …
Apple to launch iCloud on October 12
Apple announced that iCloud, a set of free cloud services, will be available on October 12. iCloud stores your music, photos, apps, contacts, calendars, documents and more, …
IBM to acquire Q1 Labs
IBM announced a definitive agreement to acquire security intelligence software provider Q1 Labs. The move aims to accelerate IBM’s efforts to help clients more …
Patching strategies
Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …
Anti-theft protection for Android and Windows devices
Norton Anti-Theft is a new Web-service that allows consumers to remotely lock, locate and recover a lost or stolen Windows based laptop, or Android smartphone or tablet. The …
McAfee to acquire NitroSecurity
McAfee announced a definitive agreement to acquire privately owned NitroSecurity, a provider of SIEM solutions that provide visibility and situational awareness. NitroSecurity …
Critical vulnerabilities in Adobe Photoshop Elements 8
Critical vulnerabilities exist in Adobe Photoshop Elements 8.0 and earlier versions. These two buffer overflow vulnerabilities (CVE-2011-2443) could cause a crash and …
FFmpeg multiple vulnerabilities
Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a Denial of Service and potentially compromise a user’s …
Using online advertising to find out if your data is valuable to a criminal
As it becomes harder for criminals to steal and exploit credit card data, will they give up their carefully crafted tools and stock of zero-day vulnerabilities, or will they …
Webroot SecureAnywhere integrates PC, Android and iOS security
Following Kaspersky One and McAfee All Access, Webroot announced centralized security management for PC, Android and iOS users. Webroot SecureAnywhere enables users to manage …
Suspect cyberbullying? Here’s five tips on what to do
Most parents know that when a bullying incident occurs with their child, they should address it immediately. In the case of cyberbullying, online tools are now available to …
Trend Micro Deep Security Parns Common Criteria EAL 4+ certification
Trend Micro announced that its advanced server and virtualization security solution, Deep Security achieved Common Criteria Evaluation Assurance Level 4 augmented (EAL 4+) …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount