Help Net Security
Secure card reader authentication for iPhone
MagTek launched iDynamo, a secure card reader authenticator, specifically designed to interface with card present payment applications made for the iPad, iPhone 3G and 3GS, …
Microsoft patches 25 vulnerabilities
In today’s Patch Tuesday, Microsoft delivers 11 security bulletins to address 25 vulnerabilities affecting Windows, Office and Exchange. Five bulletins are rated …
15 vulnerabilities patched in Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.1 (and earlier versions) for Windows, Macintosh, and UNIX, Adobe Acrobat 9.3.1 (and earlier versions) for …
The lazy programmer’s guide to secure computing
This presentation starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. We then define the …
10 online safety tips
Parents and teachers should avoid overlooking the dangers associated with the Web and the risks they pose to children. Kids today are fascinated by the Internet and extremely …
New Data Loss Prevention solution from CheckPoint
Check Point announced its new network-based Data Loss Prevention (DLP) solution that helps businesses move data loss from detection to prevention by pre-emptively protecting …
Future air travel security risks, privacy and social implications
The European Network and Information Security Agency (ENISA) has analyzed the risks associated with a future air travel scenario, enabled with “Internet of …
iPhone unlocking tricks get PCs into trouble
A malware-spreading mechanism targeting the “iPhone unlocking” fans goes to prove that cybercrime is never short of imagination. This is how the story goes: you …
Endpoint data leak prevention still a major headache
More than one in three (38%) of respondents are still failing to deploy any form of data leak prevention, whether that be device control, endpoint DLP or DLP appliances. …
Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 available
Visual Studio 2010 and .NET Framework 4 have something for every developer. The new editor, now using Windows Presentation Foundation, supports concepts such as the use of …
Identity Management for the cloud: Taking the next step
Identity and Access Management (IAM) in its present do a pretty good job dealing with internal users and systems. Unfortunately, that isn’t what most companies really …
Rogue software details: Antivirus Suite
Antivirus Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy