Help Net Security
6 million malicious files found in the past 3 months
Malware has reached its highest levels, making the first six months of 2010 the most active half-year ever for total malware production, according to a new McAfee report. At …
Security check for broadband home routers
Attackers are increasingly targeting home routers as a means of gaining access to sensitive personal data. To help combat this threat, ICSA Labs is offering a new program …
64GB secure portable USB drive
MXI Security offers a 64GB capacity device for its Stealth line of secure USB devices, suited for government customers that require high-capacity devices for Secure USB …
Gartner: Worldwide enterprise IT spending to grow
Worldwide enterprise IT spending across all industry markets will grow 2.9 percent in 2010 and surpass $2.4 trillion, according to Gartner. Analysts said that all industries …
Wipe technology for self-encrypting disk drives
Toshiba announced Wipe for Toshiba Self-Encrypting Drive (SED) models, a technology that allows special security capabilities, such as the world’s first ability for …
Tektronix Communications acquires Arbor Networks
Tektronix Communications has signed a definitive agreement to acquire Arbor Networks. The acquisition is expected to close in September and the terms of the acquisition are …
New web application firewalls from Fortinet
Fortinet announced two new appliances for its FortiWeb family of web application firewalls – the FortiWeb-1000C, designed for mid-to-large enterprises, and …
Free protection against Blackhat SEO threats
Zscaler released Search Engine Security (SES), a free solution specifically designed to combat Blackhat SEO attacks. Such attacks leverage Search Engine Optimization (SEO) …
Colleges breach students’ sensitive information
College students nationwide can be especially vulnerable to identity theft because they often give out personally identifiable information. Some universities have even been …
VirtualBox: Full virtualizer for x86 hardware
VirtualBox is an open source general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. Some of the features of VirtualBox are: …
How to render SSL useless
In this video from OWASP AppSec Research 2010, Ivan Ristic from Qualys talks about breaking SSL.
Week in review: Signs of computer infection, iPhone jailbreaking and Facebook mobile privacy
Here’s an overview of some of last week’s most interesting news and videos: Web 2.0 security in the workplace The use of social networking applications has …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface