Help Net Security
Governance on unstructured data
Businesses face challenges when implementing sound policies for dealing with their unstructured data, an ever-present thorn in the side of most enterprises today. It is …
Cybercriminals expand repertoire of tricks to avoid detection
March was testament to the fact that cybercriminals are not averse to exploiting tragedies in order to spread malware, according to Kaspersky Lab. Scammers and malware writers …
Work with NTFS and HFS+ under Mac OS X
Paragon Software released two cross-platform technologies – NTFS for Mac OS X 9.0 and HFS+ for Windows 9.0, designed to eliminate barriers between Windows and Mac …
Apple iOS 4.3.3 released
The iOS 4.3.3 software update is now available via iTunes. It contains changes to the iOS crowd-sourced location database cache including: Reduces the size of the cache No …
Self-encrypting drives most effective against data breaches
With more than 82 percent of respondents reporting one or more data breaches, a new Ponemon Institute study on self-encrypting drives found that 70 percent believed that …
Internet interconnection ecosystem resilience
The Internet has so far been extremely resilient. But will this last? A systemic failure of the Internet would cause significant problems for several sectors like energy, …
Malware campaign impersonates FBI
A new email malware campaign claims to come from the FBI and deliver a warning that they have been monitoring your Internet activities. Apparently they have logged your IP …
Malware instead of gifts for Mother’s Day
Mother’s Day has always been celebrated with gifts for moms worldwide. However, BitDefender is warning consumers that cyber crooks are taking advantage of this special …
Symantec.cloud announces new SaaS services
Symantec announced a number of new service enhancements which will bring more of Symantec’s technologies to the cloud, offering increased flexibility of choice to …
Network access control system PacketFence 2.2 released
PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks – from small to very large heterogeneous …
Rogueware campaign targeting Mac users
Bad guys distributing rogueware are attacking Mac users using Blackhat SEO techniques and poisoning search results. During our research about Osama Bin Laden’s death we …
Technology is not the only solution against spear phishing
While technology plays an important role in protecting organizations from cyber threats, spear phishing attacks focus on the human element to ensure success. No technology …