Help Net Security
Encrypted voice calling for Android
Cellcrypt launched Mobile for Android, a version of its encrypted voice calling application that runs on Android devices operating over Wi-Fi, GSM and CDMA wireless networks. …
Network security scanning and patch management
GFI LanGuard is a network security and vulnerability scanner which provides a complete network security overview, while also providing remedial action through its patch …
Key elements of an effective IT governance process
To successfully implement IT governance, chief information officers (CIOs) require both leadership and execution, according to Gartner. Great IT leaders master process, and …
Trend Micro expands risk management portfolio
Trend Micro announced new solutions for protecting enterprises from Advanced Persistent Threats (APT) known to evade conventional perimeter and content security. Today’s …
PCI Security Standards Council announces PCI awareness training
The PCI Security Standards Council announced that PCI Awareness online training is now available. An introductory level course, the four hour training is designed for anyone …
Web host victims repeatedly exploited by cybercriminals
More than one-third of respondents to an Anti-Phishing Working Group (APWG) survey were repeat victims of phishing attacks that resulted in a successful establishment of …
History and future of mobile malware
Panda Security released a report on the history, current state and future of mobile malware which aims to raise awareness of the threats affecting mobile devices as well as …
IRISS Conference 2011 call for papers
IRISS will hold its second annual conference on Wednesday the 23rd of November 2011 in Dublin. This is an all day conference which focuses on providing attendees with an …
AppSec adds blocking, virtual patching to database activity monitoring solution
Application Security announced new enhancements to DbProtect. Version 6.3 of this database security solution now includes the ability to block real-time attack and …
Week in review: LulzSec attacks, RSA admits compromise of SecurID tokens and new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: FBI affiliate organization hacked, user database leaked Only a day after they leaked …
Malware writers rely on users not updating
When infecting PCs, online criminals are increasingly benefiting from uninstalled updates for browsers and their components. Research carried out by G Data SecurityLabs …
Continued attacks on social networks
GFI Software announced the top 10 most prevalent malware threats for the month of May 2011. The month was marked by a number of Facebook survey scams baiting users with offers …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)