Help Net Security
Secure single sign-on for SaaS users
Ping Identity released PingFederate 5.2, the most complete Internet single sign-on software solution for SaaS users and SaaS vendors. It incorporates key technologies from …
95% of financial institutions vulnerable to data theft
TraceSecurity revealed today its five-year statistics on social engineering and penetration testing. The statistics show that 95% of U.S. financial institutions’ …
Google takes another step to protect user privacy
Google announced a new logs retention policy. They pledge to anonymize IP addresses on their server logs after 9 months. That’s a significant shortening of their …
Types of Web-Based Client-Side Attacks
While my research is primarily concerned with drive-by-download attacks, I thought I try to summarize other web-based client-side attacks that are out there, many of which are …
Doubling of the number of crimeware-spreading URLs
The APWG announced today that its first quarter survey reveals a near doubling of the number of crimeware-spreading URLs at the end of the period, up from the previous record …
World’s first unclonable RFID chip
Verayo launched the world’s first unclonable silicon chip – the Vera X512H RFID chip. This new RFID chip is based on recently announced breakthrough technology …
Inbound threat protection and outbound content security platform
BorderWare Technologies introduced BorderWare Security Platform 8.0, the industry’s first security appliance to provide comprehensive email and Web security with …
Advanced hybrid location solution
Polaris Wireless announced the Polaris Wireless Advanced Hybrid Solution which is designed to work in conjunction with A-GPS systems to consistently provide the highest …
SOX, Lies and Security Matters
When it comes to compliance, it’s fairly easy to find out what companies need to do to achieve it. But it’s much harder for companies to find out how they should …
Spam served as visual poetry
Alex Eckelberry posted some interesting screenshots to the Sunbelt Blog. As Alex notes, they show a cute way of bypassing the filters: If you select the text, you see …
IT security spending on the rise
Spending on IT security will continue to grow next year, according to new data unveiled by Forrester Research. The Forrester Business Data Services survey, which polled more …
Computers increasingly being infected by fake antivirus products
Panda Security’s laboratory for detecting and analyzing malware, has noted an increase in the use of malware under the guise of fake antivirus products to defraud users. …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems