Help Net Security
Secure remote file access for Mac and PC
iTwin is a USB device that allows two online computers to share military-grade encrypted data from anywhere in the world. Comprising two identical parts, iTwin can be …
DigiNotar files for bankruptcy
After having its SSL and EVSSL certificates deemed untrustworthy by the most popular browsers, VASCO announced that DigiNotar, filed a voluntary bankruptcy petition and was …
ShareSafe: Avoid malicious links on Facebook
ShareSafe is a free Facebook beta application developed by F-Secure that keeps you safe from spam and malicious links in your news feed and wall. It’s also easy to scan …
iManager multiple vulnerabilities
Gjoko Krstic has discovered multiple vulnerabilities in iManager, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate certain data, …
Cybercriminals find new ways to disguise spam
It used to be that malicious attachments came in emails with erotic photos of girls who “want to meet you”, or “scandalous photos” of celebrities. Now, …
Securing virtual environments and reducing malware risk
Rapid7 announced that the new version of its vulnerability management solution, Nexpose 5.0, will address the complex security challenges presented by the wide scale adoption …
New versions of Trend Micro enterprise data protection software
Trend Micro now offers completely integrated data protection for messaging and collaboration systems providing many feature advantages for security professionals. ScanMail for …
Smartphone and tablet security tips
ICSA Labs is offering a series of tips that businesses and consumers can use to protect themselves from security risks aimed at smartphones, tablets and apps. 1. Only buy apps …
Data seepage from the corporate boundary
In a growing number of cases, Internet-facing business systems do not always reflect a well maintained, up-to-date security profile, and, as one would expect they are, by …
Week in review: Windows 8 security features, the end of DigiNotar and BIOS rootkit in the wild
Here’s an overview of some of last week’s most interesting news: Linux Foundation suffers security breach A few weeks after the discovery of the compromise of the …
Most dangerous celebrities in cyberspace
Heidi Klum has replaced Cameron Diaz as the most dangerous celebrity to search for on the Web, according to McAfee. For the fifth year in a row, McAfee researched popular …
Evolving cyber threats continue to drive security strategy
43 percent of global companies think they have an effective information security strategy in place and are proactively executing their plans, placing them in the category of …
Featured news
Resources
Don't miss
- Self-spreading npm malware targets developers in new supply chain attack
- Microsoft extends security patching for three Windows products at a price
- AI is becoming part of everyday criminal workflows
- Why SOCs are moving toward autonomous security operations in 2026
- Binding Operational Directive 26-02 sets deadlines for edge device replacement