Help Net Security
Tips for seniors on how to avoid ID theft
Identity theft is America’s fastest growing crime, and more than 70 million people will be victims this year alone. Those receiving government benefits, on fixed …
Splunk for Cisco security solution
Splunk introduced its Splunk for Cisco Security solution, which delivers a rich security experience by providing additional insights from data generated by Cisco security …
Adobe patches Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.2 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.2 (and earlier versions) for …
A toolkit to simplify network management
Ipswitch released the WhatsUp Gold Engineer’s Toolkit, available as a free download for a limited time. The toolkit which helps monitor, diagnose and troubleshoot a vast …
Elaborate Identity theft scheme targets a million consumers
A federal court has halted an elaborate international scheme that used identity theft to place more than $10 million in bogus charges on consumers’ credit and debit …
World’s first 3 terabyte external desktop drive
Seagate announced the world’s first 3 Terabyte (TB) external desktop drive. Available immediately, the 3TB FreeAgent GoFlex Desk external hard drive which can store up …
Honeypot software for VoIP networks
Artemisa is an open source VoIP/SIP-specific honeypot software designed to connect to a VoIP enterprise domain as a user-agent backend in order to detect malicious activity at …
Web protection from the cloud
McAfee released SaaS Web Protection. The new Software-as-a-Service (SaaS) Web security solution combines the reporting capabilities and features from McAfee solutions with the …
Sentrigo expands Repscan with DB2 and MySQL support
Sentrigo released version 3.5 of Repscan, the vulnerability assessment and security scanning solution that now supports all of the most widely deployed DMBS platforms …
Protection for the Android platform
F-Secure Mobile Security 6 on the Android platform has been released. It provides security for smartphones against malicious software and also safeguards confidential data …
IEEE delivers critical 1815 DNP3 standard
IEEE announced the ratification of its IEEE 1815 Distributed Network Protocol (DNP3) standard for electric power systems communications. The new standard, which improves …
Five steps to cybersecurity risk assessment
Organizations face a constant barrage of cybersecurity threats. Botnets, malware, worms and hacking are just a few things that keep IT managers awake at night, wondering if …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance