Help Net Security
Cloud Controls Matrix 1.1 released
The Cloud Security Alliance (CSA) launched revision 1.1 of the CCM Security Controls Matrix, available for free here. The Cloud Security Alliance Cloud Controls Matrix (CCM), …
New Facebook feature raises privacy concerns
Facebook users should keep up-to-date with their privacy settings as Facebook announces its latest controversial feature. The social network is launching automated photo …
Companies lack confidence in the effectiveness of controls
A significant number of Global 1000 companies still lack the proper internal controls over, and visibility into, employee access to sensitive applications and data, according …
Performance concerns make 25% of users turn off AV
More than 60 percent of respondents have tried multiple anti-virus products over the course of a year, according to Avira. In addition, 25 percent of the users admitted to …
Tracking protection lists for Internet Explorer 9
Microsoft recently announced that IE9 will enable users to import independently curated lists of third party domains, which can be blocked or allowed access to a user’s …
Emergence of blended malware attacks lead concern for 2011
CoreTrace released their top security predictions for 2011. “The major theme in for 2011 will be evolution. The evolution of attacks like Stuxnet, the evolution of new …
MySQL 5.5 released
MySQL 5.5 delivers significant enhancements enabling users to improve the performance and scalability of web applications across multiple operating environments, including …
After the 2010 security tsunami, tips on how to survive 2011
In-house and internal threats will be a big element of 2011 as organizations begin to understand that anti-virus, malware, and phishing software is no longer effective. There …
Voice encryption app for the iPhone
Kryptos is a secure VoIP application for the iPhone. It utilizes 256-bit AES military grade encryption to encrypt voice communications between users, while using 1024-bit RSA …
Metasploit 3.5.1 adds Cisco device exploitation
Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an …
Ten tips for smartphone security
With the holiday season in full swing, more people are using their smartphone for tasks such as last minute shopping, accessing bank accounts, connecting with friends or …
Network access control system PacketFence 2.0 released
PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks – from small to very large heterogeneous …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems