Help Net Security
IDrive for WordPress: Plugin for automated backups
IDrive for WordPress is a simple plugin that lets you create an account on the fly, do an immediate backup and schedule automated daily backups for your WordPress files and …
Week in review: Microsoft and Adobe flaws, SQL injection attack, Wikileaks
Here’s an overview of some of last week’s most interesting news and articles: Critical Adobe Flash, Reader 0-day flaw exploited in the wild Adobe released the …
What every CEO should know about advanced persistent threats and industrialized hacking
The world of hacking has evolved into two major varieties: industrialized attacks and advanced persistent threats (APT). There has been a lot of discussion around the validity …
Gartner: Enterprises will reduce the share of security in their IT budgets
While security risks are not going away for companies, efficient and secure enterprises will actually safely reduce the share of security spending by 3 to 6 percent of their …
IRISS Conference 2010 call for papers
IRISS will hold its first annual conference on the 18th of November 2010. This all day conference will focus on providing you with an overview of the current cyber threats …
Early life cycle security assessment service
HP announced Comprehensive Applications Threat Analysis, a new security service to help companies reduce vulnerabilities at the onset of the application development life cycle …
Beware when placing online bets during the World Cup
With the World Cup approaching, online players all over the world are preparing to place their bets on the different soccer games. Taking security issues into account and …
iPhone security showcase: SafeWallet – Password Manager
Mobile software producer SBSH this week released a new version of SafeWallet – Password Manager, an application used for storing private information on your iPhone and …
Rogue software details: Protection Center
Protection Center is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Cyberattacks still top security priority
USIS released a study that identified key issues facing government and industry security personnel and identified a key issue in terms of security vendor structure and …
34 vulnerabilities fixed in June Patch Tuesday
In today’s Patch Tuesday, Microsoft delivers 10 security bulletins that address 34 vulnerabilities affecting Windows, Office and Internet Explorer. Vulnerabilities in …
IBM launches new security solutions
Today at the IBM Innovate 2010 conference in Orlando, IBM introduced new software and services that help organizations build security into the initial design of their …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)