Help Net Security
Five imperatives for extreme data protection in virtualized environments
Transforming an organization through server virtualization requires a strategic and coordinated approach. Data protection – which includes not only backup, but also …
Fake dislike button Facebook scam
Facebook users should be wary of the latest survey scam spreading virally across the network. There are a number of variations of this scam, which sees users unwillingly …
Security software market to grow 11% this year
Worldwide security software revenue is forecast to surpass $16.5 billion in 2010, an 11.3 percent increase from 2009 revenue of $14.8 billion, according to Gartner. Although …
Security information and event management platform
LogLogic 5 was released today. This is a product suite for centralizing and structuring IT data and its features are outlined below. Universal Collection Framework (UCF): The …
Security toolbox for .NET development and testing
In this video from OWASP AppSec Research 2010, Johan Lindfors and Dag K?¶nig from Microsoft talk about a security toolbox for .NET development and testing.
Week in review: Breaking SSL, geotagging risks and the first SMS Android Trojan
Here’s an overview of some of last week’s most interesting news, articles and videos: How to render SSL useless In this video from OWASP AppSec Research 2010, Ivan …
Cisco IOS Software TCP DoS vulnerability
Cisco IOS Software Release, 15.1(2)T is affected by a DoS vulnerability during the TCP establishment phase. The vulnerability could cause embryonic TCP connections to remain …
PCI standard changes ahead
The PCI Security Standards Council (PCI SSC) published documentation highlighting the expected changes to be introduced with version 2.0 of the PCI DSS and PA-DSS in October …
Real-time iPhone tracking app
Life360 launched its iPhone application, Family & Offender GPS Tracker. By leveraging the real-time location capabilities of iOS4, the product enables parents to …
Regulating for the cloud
This videos focus on the regulatory issues on the topic of cloud computing, in terms of the EU Data Protection Framework. The topic is of particular interest from both a …
New QuickTime for Windows fixes security vulnerability
Apple released QuickTime 7.6.7 which addresses a security vulnerability affecting the software running on Windows 7, Vista, XP SP2 or later. A stack buffer overflow exists in …
Source of recent malicious malware campaigns
The Red Condor security team today issued a warning of a new sophisticated email malware threat that is disguised as misdirected personal emails with executable attachments. …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount