Help Net Security
Your next data breach: It’s not if, it’s when
We have all seen pictures of documents stamped “Top Secret” and “Eyes Only”. We’ve seen couriers carrying documents in briefcases handcuffed to …
Enterprise risk management study
CS STARS has completed an Enterprise Risk Management (ERM) Study to gauge ERM activity. The study, done via an on-site survey of CS STARS clients, evaluates stages of progress …
10 tips to keep IT security costs down in the recession
1. Move to UTMs (unified threat management systems) UTMS save money over multiple point solutions. They can cost just a quarter of the price of multiple solutions. With UTMs …
Twitter scareware attack signals new social networking security problems
The arrival of what appears to be the first scareware distribution attack on the Twitter microblogging service at the weekend, signals the fact that firms need to think very …
Free detection of viruses and spyware wherever you go
How many times have you found yourself providing computer support for your family and friends? This summer, F-Secure Online Scanner will make that task easier. The Online …
The first DRM solution approved by an anti-DRM gamers group
ByteShield received the results from the PRISM/RYG testing of ByteShield. PRISM, a gamers group for sensible DRM solutions, has thoroughly tested ByteShield and found it to be …
OpenSolaris 2009.06 released
Sun unveiled OpenSolaris 2009.06, delivering features in networking, storage and virtualization, along with performance enhancements and developer productivity updates. …
Compact forensic data capturing solution from Logicube
Logicube’s Forensic Quest is meant for in-the-field or in-the-lab hard drive forensic data acquisition and verification. Users can now capture and authenticate hard …
Fingerprint sensor with integrated LEDs
UPEK unveiled its TouchLight technology which integrates light emitting diodes (LEDs) for user prompting and feedback directly into the company’s broadly adopted …
High-accuracy mass intercept location solution
Polaris Wireless announced the first high-accuracy mass intercept location application. The mass intercept solution is capable of pinpointing the precise location of all …
Low bit levels could compromise encryption
Newswire reports suggest that the take-up of encryption amongst organizations is improving, but there is a big question mark over the encryption used being powerful enough to …
Three year old worm accounts for almost a quarter of email-borne malware
Sophos has revealed the most prevalent malware threats and countries causing problems for computer users around the world during November 2007. The study, compiled by …
Featured news
Resources
Don't miss
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”