Help Net Security
What To Do About Social Networking In Your Company
The growing popularity of social networking sites such as Facebook, Bebo and MySpace is slowly developing into a massive headache for IT administrators as employees spend time …
Survey reveals link between privileged users and breaches
Imperva announced that key findings in a new independent benchmark report conducted by Aberdeen Group reveal that monitoring privileged database users significantly reduces …
European mobile operators aren’t protecting users against spam
Cloudmark announced the results of a recent survey, which finds that 100 percent of the top 12 mobile operators in Europe anticipate mobile spam volumes to rise as adoption of …
Consumers trust biometrics for data protection
More than two-thirds (67 percent) of consumers surveyed around the world trust fingerprint scans to verify their identities with banks, government agencies and other …
New AirMagnet Survey features help optimize Voice-Over-WLAN
AirMagnet announced new features for AirMagnet Survey that enhanced its ability to help customers optimize their voice-over-WLAN (VoWLAN) deployments for Cisco and Vocera …
Enterprise-wide approach improves financial crime fighting performance
Research among international financial services organizations undertaken by Norkom Technologies reveals that those who have adopted an enterprise-wide approach to the …
2009 IT security forecast
As 2008 – a year in which a record number of data breaches occurred and over 22 million records were compromised – comes to a close, Utimaco has unveiled the top …
Enhanced line of Sun Fire x64 servers and Sun Blade systems
Sun Microsystems announced an enhanced line of Sun Fire x64 servers and Sun Blade systems that deliver up to 35 percent better performance over previous generations. With the …
Cybercriminals use Flash ads for distributing malicious code
Finjan announced the latest findings by its Malicious Code Research Center (MCRC) indentifying and analyzing the latest trends in cybercrime. Cybercriminals take advantage of …
Targets for malicious attacks in 2009
MX Logic published a list of New Year’s Resolutions that it predicts spammers to make this coming year. They are: 1. Harass users on Facebook, Twitter, MySpace and other …
Minimize your data loss even if .MDB databases are corrupt
DataNumen announced the release of Advanced Access Repair 2.0. If .MDB files are corrupt or damaged, this repair engine will recover the data at the maximum possibility. In …
Organizations struggle with push to encrypt personal data
In a move highlighting the necessity of strong data security regulations to ensure that businesses protect sensitive customer data, new laws beginning to take effect in …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems