Help Net Security
Internet-optimized x86-server from SeaMicro
SeaMicro emerged from stealth mode to launch the SM10000, an Internet-optimized x86-server that reduces by 75 percent the power and space used by servers. In development for …
Do you have what it takes to pass your PCI audit?
With every company reliant on software to run its business, an alarming rise in data breach incidents across industries, but especially credit card processing, means …
VMware Data Recovery 1.2 released
VMware Data Recovery protects against data loss in your virtual environment by enabling backups to disk as well as fast and complete recovery. Resolved issues The following …
Gartner: Organizations need to re-evaluate SaaS
Software as a service (SaaS) will have a role in the future of IT, but not the dominant future that was first thought, according to Gartner. Organizations should carefully …
Keyloggers posting on webpages
Numerous keystroke logger entries have piled up on Pastebin.com giving rise to suspicions of massive keylogger infestations. As if the number of keystroke logger entries that …
Paid security solution still seen as a waste
Over the past years, Brazil experienced an exponential increase in both quantity and complexity of virtual attacks and spam. However, only 14.2% of Brazilians with Internet …
IDrive for WordPress: Plugin for automated backups
IDrive for WordPress is a simple plugin that lets you create an account on the fly, do an immediate backup and schedule automated daily backups for your WordPress files and …
Week in review: Microsoft and Adobe flaws, SQL injection attack, Wikileaks
Here’s an overview of some of last week’s most interesting news and articles: Critical Adobe Flash, Reader 0-day flaw exploited in the wild Adobe released the …
What every CEO should know about advanced persistent threats and industrialized hacking
The world of hacking has evolved into two major varieties: industrialized attacks and advanced persistent threats (APT). There has been a lot of discussion around the validity …
Gartner: Enterprises will reduce the share of security in their IT budgets
While security risks are not going away for companies, efficient and secure enterprises will actually safely reduce the share of security spending by 3 to 6 percent of their …
IRISS Conference 2010 call for papers
IRISS will hold its first annual conference on the 18th of November 2010. This all day conference will focus on providing you with an overview of the current cyber threats …
Early life cycle security assessment service
HP announced Comprehensive Applications Threat Analysis, a new security service to help companies reduce vulnerabilities at the onset of the application development life cycle …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems