Help Net Security
Sourcefire acquires Immunet
Sourcefire announced the acquisition of Immunet, a provider of cloud-based anti-malware technologies. The total acquisition price is $21 million in cash, which included $17 …
Critical vulnerability in ImgBurn
A vulnerability has been discovered in ImgBurn, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The vulnerability is …
GoFlex for Mac external drives easily used with Windows
Addressing the personal preferences of the Mac community, Seagate introduced a new collection of GoFlex for Mac external drives designed to make it easy for those who use Mac …
Move to electronic health records raises privacy and security concerns
What are the top security and privacy issues facing the healthcare industry in 2011? A panel of healthcare experts representing privacy, trends, technology, regulatory, data …
QualysGuard integration with BeyondTrust PowerBroker
BeyondTrust and Qualys announced a technology partnership to integrate QualysGuard with BeyondTrust’s PowerBroker for Unix Servers. The integration will enable customers …
Microsoft confirms unpatched Windows vulnerability
Microsoft released a new security advisory to address a publicly disclosed vulnerability affecting Microsoft Windows’ Graphics Rendering Engine on Windows Vista, Server …
The evolution of cyber criminal operations
There is a concerning evolutionary step cyber criminal operations are taking to more effectively diversify the distribution of their ill-gotten gains, according to Fortinet. …
Most federal employees take IT security seriously
Most Federal employees go beyond baseline IT security requirements, according to a new survey by the Government Business Council. While 97 percent of Federal employees are …
Dell to acquire SecureWorks
Dell has signed a definitive agreement to acquire SecureWorks, a provider of information security services. SecureWorks protects information assets, improves compliance and …
Secure your iMac with a lock
MacLocks is making iMac theft prevention possible, following up their successful iPad lock. The all new Maximum Security iMac lock makes it easier than ever to lock down an …
Mobile users more vulnerable to phishing attacks
Trusteer recently gained access to the log files of several web servers that were hosting phishing websites. Analyzing these log files provided visibility into how many users …
Assessing, testing and validating Flash content
In this video, Peleus Uhley, the Platform Security Strategist at Adobe, talks about assessing, testing and validating Flash content. He discusses cross-site scripting, code …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online