Help Net Security
New Iomega eGo portable hard drives with security software
Iomega announced a new generation of the eGo portable hard drive, featuring new look USB 2.0-powered models with sruggedness and a suite of bundled data protection software, …
Red Hat Enterprise Linux 4.8 is out
Today Red Hat unveiled the eighth update to Red Hat Enterprise Linux 4. The company notes that the focus of product updates in the future will shift away from providing …
Cisco outlines strategy for highly secure Smart Grid infrastructure
Cisco today outlined its plan to deliver an end-to-end, highly secure network infrastructure solution that helps utility companies and their customers manage power supplies …
Ford debunks £10,000 Fusion Hybrid email hoax
Sophos is warning computer users not to believe everything they read in an email, following news that Ford Motor Company has been the victim of a bogus email hoax claiming the …
Waging war on cyber threats
The Obama Administration did what many in the political and national security arenas have been advocating for some time – make Cybersecurity its own Department of …
Microsoft releases Surface SP1
Microsoft Surface represents the next generation of customer digital interaction. There’s no mouse or keyboard, the product employs a camera-based vision system that …
Web penetration testing live CD
The Samurai Web Testing Framework is a live Linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open …
New version of DeleGate, a multi-purpose application level gateway
DeleGate is a multi-purpose application level gateway or proxy server that mediates communication of various protocols, applying cache and conversion for mediated data, …
McAfee acquires Solidcore Systems
McAfee announced a definitive agreement to acquire privately owned Solidcore Systems for approximately $33 million in cash up front and with an earn-out of up to an additional …
Strong webmail with a twist
StrongWebmail is the first email account to confirm a user’s identity using something they know (their password) and something they have (their telephone). When a person …
Q&A: Analyzing the security, compliance and cost benefits of tokenization
Tokenization has been billed as the magic data security bullet for retailers, offering strong protection for stored sensitive data and an attractive cost-saving strategy for …
Cybercriminals imitating social networks to spread malware
The results of new research conducted by Websense Security Labs reveal a growing domain-name cloning trend among cybercriminals seeking to take advantage of the huge number of …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices