Help Net Security
Enterprises enticed by cloud computing but worry about security
Enterprises that are looking to implement the benefits of cloud computing into their businesses want to be sure the forecast is clear of Internet security threats that could …
iPhone secure IT management app
MobileIron announced its secure IT management application for the iPhone is available in the App Store. It includes a powerful set of security and management features to …
A simple way to protect removable drives from malware
You don’t need a lot of time or knowledge to execute the few changes that Trend Micro suggests protecting your drive against the Autorun feature. To be able to do this, …
Free backup and recovery for Windows
Comodo Backup 2.0 provides convenient one-click backup of email accounts, Windows registries and system partitions. It allows administrators to schedule backups to fit work …
Seagate secure self-encrypting drive
Seagate announced worldwide availability of the Seagate Secure Self-Encrypting Drive (SED) option across its portfolio of hard drives. Products with the Seagate Secure option …
F-Secure Rescue CD 3.11 released
The F-Secure Rescue CD is a free tool you can use to fix a computer that no longer starts because the operating system has been corrupted by malware. For more advanced users, …
Trend Micro offers enterprise Mac security
Trend Micro Security for Mac 1.5 is designed to protect corporate Mac users against viruses, spyware, blended threats and platform-independent Web-based attacks on the Mac …
BeEF: Browser exploitation framework
BeEF is a browser exploitation framework that demonstrates the collecting of zombie browsers and browser vulnerabilities in real-time. It provides a command and control …
Seagate hard drive with Serial ATA 6Gbit/second technology
Seagate began global shipments of Barracuda XT, a 7200RPM desktop hard drive featuring 2TB of storage capacity and a Serial ATA (SATA) 6Gb/second interface. The 3.5-inch …
Number of domain names reaches 184 million
Domain names continue to show growth across the Internet, according to the second quarter 2009 Domain Name Industry Brief published by VeriSign. The second quarter of 2009 …
Multi-vendor interoperability of iris recognition technology for Homeland Security
Unisys has demonstrated the ability to use multiple iris recognition technologies in a single system, eliminating the need for the Department of Homeland Security and others …
Centralized command and control center appliance for environments with no expertise
Proximex announced Proximex C100, a centralized command and control center appliance. Intended for security environments with little or no IT staff or expertise, it offers a …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations