Help Net Security
Study: Security vulnerabilities in 38% of network devices
A new report presents real-world results – including common security vulnerabilities and violations – unearthed by Dimension Data during the 235 Technology …
Formation of the Cloud Communications Alliance
Eight leaders in hosted-IP voice and data communications announced the formation of the Cloud Communications Alliance, a consortium that will drive development and adoption of …
Real-life consequences for choosing convenience over security
Despite being aware of security threats, the risky online behavior of young adults can negatively affect their future career prospects and financial standings, while leaving …
Stop man-in-the-browser attacks with Entrust IdentityGuard Mobile
As man-in-the-browser attacks continue to siphon funds from unsuspecting businesses and consumers, Entrust delivers a new authentication method for smartphones. Entrust …
100 potential attacks per second blocked in 2009
Symantec released its new security threat report which highlights key trends in cybercrime from Jan.1, 2009 to Dec. 31, 2009. In a year bookended by two very prominent cyber …
20 critical controls interactive from SANS
The SANS Institute released its 20 Critical Security Controls online interactive, a platform built to simplify the controls and let users choose how to consume them. The …
ESET Remote Administrator 4 released
ESET announced availability of ESET Remote Administrator 4 which simplifies the deploymen and management of ESET business solutions. Key features and benefits include: …
Gray Powell, the lost iPhone and malware
The story of the day is Gray Powell and the lost iPhone. I searched for him on Google and I was really surprised to see that 4 out of 10 results from Google’s first page …
Data integrity attacks a growing threat
A survey by Infosecurity Europe of 420 organizations has found that a quarter (28%) have been subject to a data integrity attacks. Of those that think that data integrity …
Splunk 4.1.1 brings 60+ fixes
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …
User access continues to be poorly managed
Findings gathered from a Ponemon Institute and Aveksa survey of 728 experienced IT practitioners at multinational corporations and government organizations show that …
Rogue software details: VirusOut
VirusOut is a rogue security application. In order to remove it, find out what folders and registry entries to look for below. Known system changes: Folders …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy