Help Net Security
New business security products from G Data Software
G Data Software announced the availability of its Version 11 product line, enhanced to provide businesses with the most up-to-date technology for protection across their …
NetSecL Linux 3.2 released
NetSecL is a hardened, live and installable operating system based on OpenSuse suitable for desktop/server and penetration testing. Once installed you can fully enjoy the …
Vulnerable firmware could destabilize Internet-enabled technologies
Kill switches and backdoors inserted at the point of manufacture could act as a conduit for organized criminals or foreign states to access internet-enabled devices, according …
Active Directory Change Reporter 7.0 released
NetWrix released Active Directory Change Reporter 7.0 which automates auditing of who changed what, when and where in Active Directory, Group Policy and MS Exchange, for …
Week in review: Booz Allen Hamilton breach, Google+ related scams and malware ecosystems
Here’s an overview of some of last week’s most interesting news and articles: “Casey Anthony confession video” scam spreads The verdict in the …
Verizon takes on issue of stolen credentials
Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …
Secure mobile device access on single authentication platform
SafeNet announced its new mobile device credentialing solution that enables the secure use of consumer mobile devices on corporate networks. SafeNet’s Authentication …
Mitigating software vulnerabilities
Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …
Practical steps to improve your corporate security posture
Sony, Lockheed Martin, Nintendo, Groupon – In fact we could go on and on. Financial services, government agencies, health care records – It doesn’t matter. …
Trend Micro expands SecureCloud
Trend Micro SecureCloud, the encryption service with policy-based key management, has been expanded with a new offering designed for cloud service providers, as well as …
Apache Tomcat security bypass vulnerability
A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a …
Analyzing and dissecting Android applications for security defects and vulnerabilities
In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around …
Featured news
Resources
Don't miss
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security