Help Net Security
New consortium to improve security products
ICSA Labs has founded the Endpoint Security Consortium to help improve enterprise endpoint security products industrywide. The mission of the consortium is to create publicly …
Top 10 privacy issues for 2011
The prevalence of mobile devices with personally identifiable location-based information and the increasing use of social media are top concerns for 2011. With more personal …
Real-time forensic search engine
eIQnetworks launched ForensicVue, the first real-time forensic search engine to provide security analysts with the ability to search every piece of security data on their …
Government seizes 82 website domains
Seizure orders have been executed against 82 domain names of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works as …
Toshiba announces new self-encrypting drive
Toshiba announced a 7,200 RPM 2.5-inch Self-Encrypting Drive (SED) that provides government-grade AES-256 hardware encryption incorporated in the disk drive’s controller …
Organizations still fail to control USB devices
A survey has found that USB Flash drive ownership has exploded with 100% of the 229 respondents having at least one such device and more than 21% owning as many as 10 or more. …
EU investigates Google antitrust violations
The European Commission has decided to open an antitrust investigation into allegations that Google has abused a dominant position in online search, in violation of European …
Canon image originality verification proven useless
ElcomSoft discovered vulnerability in Canon’s Original Data Security System, a validation system to guarantee authenticity of digital images captured with supported …
Tips to protect yourself from Cyber Monday threats
On the Monday after Thanksgiving, more than 100 million Americans will be using their computers and network connections to search for deals and start their holiday shopping, …
Trend Micro acquires Mobile Armor
Trend Micro purchased data protection specialist Mobile Armor. Financial terms are not disclosed. The transaction, which is subject to certain closing conditions, including …
Week in review: Online shopping safety, malware hybrids and Packet Wars
Here’s an overview of some of last week’s most interesting news, articles and reviews: Google Apps Script API flaw allowed attacker to impersonate Google Details …
Network security facing dual challenge
Network security systems are under pressure. You might not be experiencing it yet, but you will soon. The dual challenge of dealing with more attacks at higher speeds …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems