Help Net Security
CompTIA A+ certification exams updated
CompTIA announced today an update to its certification CompTIA A+ with new content that reflects changing job requirements for tech support workers. Approximately 725,000 …
Hitachi ships 2TB hard drives with bulk data encryption
Hitachi is now shipping their enterprise-class, 7200 RPM 2TB offering, the Ultrastar A7K2000. This hard drive is designed, manufactured and tested to ensure …
Campaign Monitor attacked, accounts compromised
E-mail marketing service Campaign Monitor has been attacked and some accounts have been compromised. The company labeled this as a deliberate, planned and complex intrusion …
Video: Mitigating Web-based malware attacks
Over the past few years, malware spreading primarily by infecting web pages has been a significant emerging trend that has become so significant that the major search engines …
Portable smart card readers from SCM Microsystems
Smart cards are being used worldwide to secure identities in many applications, such as bank payment cards, employee access badges, government identity cards and healthcare …
Arch Linux 2009.08 released
Arch Linux is a lightweight and flexible Linux distribution. The 2009.08 snapshot images are now available. Changes since the 2009.02 release: built from a current snapshot of …
jCryption: Javascript HTML form encryption plugin
jCryption is a javascript HTML form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form. It uses the Multiple-precision and Barrett …
4-drive rack mounted NAS servers from Qnap
Qnap expanded their Turbo NAS lineup with a pair of NAS servers for the corporate and entry-level enterprise market. The new TS-439U-RP and TS-439U-SP models are both 4-drive …
12 tips to protect your identity at school
Schools are traditionally open and unprotected environments. Keeping your personal information secure is a critical responsibility. Losing that information can impact you the …
Protecting enterprises against Web application attacks with IBM
As threats and attacks increasingly target Web applications, many enterprises have been forced to take a reactive approach to security with point products that address only …
Malware beyond Vista and XP
Windows may be ubiquitous, but there’s a thriving variety of alternative operating systems for enterprise and home use. However, the alternatives aren’t as risk …
New book: “Natural Language Processing with Python”
Technologies based on Natural Language Processing, or NLP, are becoming increasingly widespread. In Natural Language Processing with Python, authors Steven Bird, Ewan Klein, …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations