Help Net Security
Confidential school records made available online
Recent media reports state that more than 100,000 student records were accidentally made available online. The security blunder by The Princeton Review, an educational …
Code signing certificates for Adobe AIR applications
VeriSign today released VeriSign Code Signing Certificates for an application on Adobe AIR. Adobe AIR is a cross-operating system runtime that enables rich Internet …
Deep packet inspection testing methodology videos and documentation
BreakingPoint Systems released a detailed test methodology and video series that enables network engineers to test the deep packet inspection (DPI) features of content-aware …
Internet Terrorist: Does Such A Thing Really Exist?
Recently, I have experienced an increase in organizations questioning how real is the threat of Internet terrorism and what they can do to protect themselves. As a former …
New version of SifoML e-mail gateway appliance
O2Security released the newest version of its email gateway appliance. SifoML v3.9 provides new features and enhancements, including the ability to prevent attacks on networks …
Summary of changes to next version of PCI Data Security Standard
The PCI Security Standards Council (PCI SSC) announced the summary of forthcoming changes to PCI DSS as it moves from version 1.1 to the previously announced version 1.2 in …
Personal data of 92,095 credit applicants exposed in a security breach
A computer server within InterActive Financial Marketing Group (IFMG), a division of Dominion Enterprises located in Richmond, Virginia, was hacked into and illegally accessed …
Symantec to acquire PC Tools
Symantec Corp. signed a definitive agreement to acquire PC Tools, a global provider of innovative software products designed to protect the privacy and security of Windows …
Reputation Attacks: A Little Known Internet Threat
Reputation attacks target both individuals and companies, and their goal is to ruin the victim’s reputation. While attack techniques are varied, the consequences are …
Detect and prevent data loss due to misdirected email
NextLabs released Enterprise DLP 3.5, the latest release of its host-based data loss prevention system that proactively applies identity-driven policy to prevent external data …
OTS Red Flag examination procedures
Now that the Office of Thrift Supervision (OTS) has unveiled its FACT Act Red Flags examination procedures, financial institutions are getting the first concrete look at what …
Protect applications within virtual environments
Check Point announced VPN-1 Virtual Edition (VE). Virtualization of multiple servers into a single appliance creates an entirely new type of environment that requires new ways …
Featured news
Resources
Don't miss
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers
- U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
- A safer way to break industrial systems (on purpose)
- Maltrail: Open-source malicious traffic detection system