Help Net Security
Facebook revamps its Safety Center
Facebook launched a completely redesigned Safety Center with new resources designed to inform parents, educators, teens, and members of the law enforcement community about …
Secure card reader authentication for iPhone
MagTek launched iDynamo, a secure card reader authenticator, specifically designed to interface with card present payment applications made for the iPad, iPhone 3G and 3GS, …
Microsoft patches 25 vulnerabilities
In today’s Patch Tuesday, Microsoft delivers 11 security bulletins to address 25 vulnerabilities affecting Windows, Office and Exchange. Five bulletins are rated …
15 vulnerabilities patched in Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.1 (and earlier versions) for Windows, Macintosh, and UNIX, Adobe Acrobat 9.3.1 (and earlier versions) for …
The lazy programmer’s guide to secure computing
This presentation starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. We then define the …
10 online safety tips
Parents and teachers should avoid overlooking the dangers associated with the Web and the risks they pose to children. Kids today are fascinated by the Internet and extremely …
New Data Loss Prevention solution from CheckPoint
Check Point announced its new network-based Data Loss Prevention (DLP) solution that helps businesses move data loss from detection to prevention by pre-emptively protecting …
Future air travel security risks, privacy and social implications
The European Network and Information Security Agency (ENISA) has analyzed the risks associated with a future air travel scenario, enabled with “Internet of …
iPhone unlocking tricks get PCs into trouble
A malware-spreading mechanism targeting the “iPhone unlocking” fans goes to prove that cybercrime is never short of imagination. This is how the story goes: you …
Endpoint data leak prevention still a major headache
More than one in three (38%) of respondents are still failing to deploy any form of data leak prevention, whether that be device control, endpoint DLP or DLP appliances. …
Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 available
Visual Studio 2010 and .NET Framework 4 have something for every developer. The new editor, now using Windows Presentation Foundation, supports concepts such as the use of …
Identity Management for the cloud: Taking the next step
Identity and Access Management (IAM) in its present do a pretty good job dealing with internal users and systems. Unfortunately, that isn’t what most companies really …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware