Help Net Security
New variant of Conficker
Trend Micro discovered a new file sourced by a known Conficker P2P IP node – a new variant of Conficker now known as WORM_DOWNAD.E, indicating that creators behind the …
Security policies should include Twitter?
Business should review their security policies to include Twitter, according to a guide released today by Network Box. The guide includes this advice for companies: User …
Free Web browsing security for the iPhone and iPod touch
Trend Smart Surfing is a free secure browser application for iPhone and iPod touch that offers another layer of protection against Web threats by blocking access to malicious …
Acceptable security controls a rarity
Amid tightening budgets and streamlining operations, most companies are still relying on antiquated security procedures that don’t take the actuality of widespread …
Snort 2.8.4 is now available
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
Microsoft report shows rogue security software a top threat
Microsoft released the sixth volume of its Microsoft Security Intelligence Report, which showed a significant increase in rogue security software and evidence that threats are …
2009 brings worms and more worms
According to F-Secure, the biggest malware story of 2009 so far has been the Conficker (aka Downadup) worm. It is a classic worm exploiting vulnerabilities in Microsoft …
21 million personal card readers delivered in Europe
Xiring announces the 2009 market figures for strong authentication solutions. In total 21 million bank card based strong authentication solutions have been delivered in Europe …
The Manga Guide to Databases
While writing this review, I turned my head right and visually browsed my bookshelf. Somewhere in the third row there are six different books related to databases, especially …
National Security Council senior director to keynote RSA 2009
RSA Conference announced that Melissa Hathaway, Acting Senior Director for Cyberspace for the National Security Council (NSC) and Homeland Security Council (HSC), will deliver …
Survey shows configuration management is critical but organizations aren’t investing in it
Shavlik Technologies announced results of a survey the company recently conducted with responses from over 435 IT operations and security specialists. The survey illustrates …
Drobo Pro: self-monitoring and self-healing functionality
Data Robotics introduced DroboPro, which delivers a simplified storage experience enhanced by advanced self-monitoring and self-healing functionality that enables businesses …
Featured news
Resources
Don't miss
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days