Help Net Security
Panasonic Toughbook S10 comes with security features
Panasonic announced the Toughbook S10. Powered by an Intel Core i5-2520M vPro processor, it delivers up to 12.5 hours of standard battery life and weighs only 3.0 pounds. The …
A look into Black Hat’s wireless network
Aruba Networks, which provided and maintained the wireless network for last week’s Black Hat USA 2011 conference, today provided some interesting statistics around the …
Half of organizations lost information on USB drives
Inexpensive consumer USB Flash drives are ubiquitous in all manner of enterprise and government environments – typically with very little oversight or controls, even in …
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give …
Microsoft releases 13 security bulletins, fixes 22 vulnerabilities
Today Microsoft released 13 security bulletins, two rated Critical, nine Important and two Moderate. These bulletins address 22 unique vulnerabilities in Internet Explorer, …
FBI officials become spam targets
Various government agencies and high ranking government officials have been the target of previous spam attacks. In their attempts to lure victims, criminals continue to …
Social networking users becoming privacy aware
A vast majority of computer users do not post vacation memories via social networks, according to a recent survey by Avira. During a June 2011 survey of its customers, …
Parental control software for smartphones
Code9 Mobile launched Code9 Mobile, a smartphone application that enables families to establish acceptable cell phone usage rules so kids learn to use their mobile devices in …
What really breaks SSL?
After years of being ignored — which is an unusual situation for the protocol that secures the Web — SSL became the focus of the interests of the security …
UK network and ISP study reveals slow speeds and geographic variance
A study by Pando Networks revealed striking disparities between the theoretical and real-world download speeds for British broadband users. By tracking the end-user speeds for …
Protecting mobile phones? Most don’t bother
Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …
TYPO3 multiple vulnerabilities
Multiple vulnerabilities have been reported in TYPO3, according to Secunia. These can be exploited by malicious users to bypass certain security restrictions, conduct script …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)