Help Net Security
Home security iPhone application
Platinum Protection is now offering a new application for iPhone devices, making it possible for homeowners to remotely arm and disarm their security system, as well as …
19% of online attacks in 2009 targeted social networking sites
Breach Security announced a steep rise in attacks against social networking sites, according to the Web Hacking Incidents Database (WHID) 2009 Bi-Annual Report. Accounting for …
Hacker faces 20 years in prison for attack on U.S. retail and banking networks
Albert Gonzales, 28, of Miami, was indicted today for conspiring to hack into computer networks supporting major American retail and financial organizations, and stealing data …
Log management, reporting and forensics tool
Global DataGuard has released version 3.4 of its Firewall/Syslog Module technology to provide increased storage; up to 1.5 terabytes of onboard storage; search capabilities …
Fingerprint solution for PCs and netbooks from AuthenTec
AuthenTec introduced a family of smart sensor hardware and software solutions designed for new consumer notebook PCs and netbooks. It includes smart fingerprint sensors …
Agent-less remote administration of Windows machines
PJ Technologies announced the release of WMIX v2 (Windows Management Instrumentation eXplorer). WMIX is a GUI based implementation of WMI technology which performs agent-less …
New model of the BlackBerry Smart Card Reader
RIM unveiled a new model of the BlackBerry Smart Card Reader – a lightweight, wearable, ISO 7816 compliant card reader that enables proximity controlled access to a …
The IEEE Standards Association announced the Industry Connections Security Group
The IEEE Standards Association (IEEE-SA) announced the Industry Connections Security Group (ICSG), a global effort to pool experience and resources in combating the systematic …
A closer look at Elcomsoft Advanced Office Password Breaker 3 Enterprise Edition
Elcomsoft Advanced Office Password Breaker breaks passwords and unlocks password-protected MS Word documents and Excel spreadsheets instead of attacking and recovering complex …
AWS Import/Export adds Export for Amazon S3
The AWS Import/Export beta now supports export from Amazon S3. AWS Import/Export accelerates moving large amounts of data into and out of AWS using portable storage devices …
New book: “Best iPhone Apps: The Guide for Discriminating Downloaders”
With over 50,000 iPhone apps to choose from, there’s a mind-boggling number of ways to make your favorite device do just about anything you can imagine – and …
Cybercriminals exploit trending topic of Ashley Greene nude pictures
Users should be wary of links to websites that are currently circulating on the web claiming to offer naked pictures of popular US film star Ashley Greene. Cybercriminals are …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations