Help Net Security
Guide helps enterprises design and implement key controls
Recent international regulations have placed the need for monitoring internal controls at the top of the boardroom agenda. Having controls in place is a basic business …
High expectations for personal information protection
According to a recent survey by ING, nine in 10 adults agree that financial services companies should be doing more to protect their customers’ personal and financial …
Navigation and fingerprint authentication device
AuthenTec unveiled today the world’s smallest fingerprint sensor for combining authentication and navigation functions in one device, the AES850. This low profile sensor …
Politically motivated cyber attacks
According to a new report, 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber …
Security updates for Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.4 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.4 (and earlier versions) for …
The rise of crimeware
Nearly two billion people today use the Internet and in doing so, expose themselves to an extensive and growing number of malware threats. CA researchers identified more than …
The persistence of Trojan attacks and scareware
GFI announced the top 10 most prevalent malware threats for the month of September 2010. Statistics show a staggeringly consistent attack primarily by the same Trojan horse …
WatchGuard gets virtual on security
WatchGuard released a virtualized version of their Quarantine Management Server. Used in conjunction with WatchGuard XCS content security appliances, the WatchGuard QMS …
Oracle buys Passlogix
Oracle acquired Passlogix, a provider of enterprise single sign-on (ESSO) solutions. Passlogix products help organizations improve and simplify security by enabling SSO for a …
Qualys acquires Nemean Networks
Qualys announced the acquisition of Nemean Networks,completed on August 31, 2010. This acquisition will expand Qualys’ research capabilities further into intrusion and …
Free iPhone rogue applications on Facebook
Sophos is warning Facebook users about messages currently circulating on the social network claiming that friends have received free iPhones. These messages, which have been …
Finding and managing SSL digital certificates
Digital certificates are now cornerstones to business technology. Located on servers, devices, networks and communication platforms, they represent a necessary security …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains