Help Net Security
Free security tool detects vulnerable and outdated software
Secunia released version 2.0 of their Personal Software Inspector (PSI), a popular free security tool for home users that protects their personal and financial information …
Facebook scams soar
Facebook users should be careful about survey scams that are quickly spreading across the social network. Many Facebook users are struggling to clean up their accounts once …
How to keep mobile devices secure while traveling
“Tis the season to be jolly – and to leave sensitive corporate information behind at the airport! According to telephone interviews with the lost property offices …
5 steps to detect and prevent fraud in the public sector
Where there is money, there is the potential for misappropriation or misuse – intentional or otherwise. Nowhere is this more apparent than in governments where funds are …
Week in review: Gawker breach, social engineering and security predictions for 2011
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Gawker Media breach claimed by Gnosis The credit for the breach of …
Cloud Controls Matrix 1.1 released
The Cloud Security Alliance (CSA) launched revision 1.1 of the CCM Security Controls Matrix, available for free here. The Cloud Security Alliance Cloud Controls Matrix (CCM), …
New Facebook feature raises privacy concerns
Facebook users should keep up-to-date with their privacy settings as Facebook announces its latest controversial feature. The social network is launching automated photo …
Companies lack confidence in the effectiveness of controls
A significant number of Global 1000 companies still lack the proper internal controls over, and visibility into, employee access to sensitive applications and data, according …
Performance concerns make 25% of users turn off AV
More than 60 percent of respondents have tried multiple anti-virus products over the course of a year, according to Avira. In addition, 25 percent of the users admitted to …
Tracking protection lists for Internet Explorer 9
Microsoft recently announced that IE9 will enable users to import independently curated lists of third party domains, which can be blocked or allowed access to a user’s …
Emergence of blended malware attacks lead concern for 2011
CoreTrace released their top security predictions for 2011. “The major theme in for 2011 will be evolution. The evolution of attacks like Stuxnet, the evolution of new …
MySQL 5.5 released
MySQL 5.5 delivers significant enhancements enabling users to improve the performance and scalability of web applications across multiple operating environments, including …
Featured news
Resources
Don't miss
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks