Help Net Security
Portable device management and protection for Mac users
Cososys has released Endpoint Protector 2009, a new version of its device management, endpoint security and data loss prevention solution for Mac/Apple computers. The newly …
Dangers of wireless network use still unknown to many
Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a new study. In an ‘ethical hacking’ experiment conducted across six UK …
Agentless configuration auditing
nCircle announced the new version of its Configuration Compliance Manager, an agentless configuration auditing and file integrity monitoring solution that automatically …
Poor password practices and how to change them
When it comes to safeguarding personal information online, many people leave their virtual keys in the front door. A survey of more than 2,500 people from the United States, …
Full-service virtual SIEM solution
LogLogic announced the release of a full-service virtual SIEM solution. Leveraging the recently released LogLogic 5 software, LogLogic’s MX Virtual delivers all the …
Oracle’s critical patch update advisory for October 2010
Oracle just released a new Critical Patch Update, a collection of patches for multiple security vulnerabilities. The update also includes non-security fixes that are required …
49 vulnerabilities fixed in record Patch Tuesday
In today’s mammoth Patch Tuesday, Microsoft delivers 16 security bulletins that address 49 vulnerabilities affecting Windows, Internet Explorer, Microsoft Office, and …
Data retention system for cyber investigative operations
Bivio Networks announced the launch of its Data Retention System, a data collection and retention system to strengthen cyber security operations for network operators and …
Questions to ask of a cloud provider
At the RSA Conference Europe 2010, the Cloud Security Alliance (CSA) released version 1.0 of the Consensus Assessments Initiative Questionnaire. The questionnaire is available …
RSA offers complete threat management solution
RSA, the Security Division of EMC, announced a set of core technologies and services designed to help organizations more effectively manage information risk and IT compliance …
HID Global acquires ActivIdentity
HID Global announced that parent company ASSA ABLOY has entered into a definitive agreement to acquire ActivIdentity. ActivIdentity provides identity assurance solutions, …
Bugat Trojan linked to LinkedIn phishing campaign
Researchers have discovered a new version of the Bugat financial malware used to commit online fraud. Bugat was distributed in the recent phishing campaign targeting LinkedIn …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)