Help Net Security
C2 Systems: No Longer a Proprietary Issue
The past five years have seen remarkable transformation in how military Command and Control (C2) systems are designed and procured. Proprietary and costly custom developed …
The demand for RFID and biometric security solutions
Government and security agencies worldwide increasingly demand high-tech solutions to secure their borders. In response, the security industry is developing technology that …
Shocking data privacy abuse by UK businesses
UK businesses are giving out highly personal and confidential details about their customers to third parties in a bid to boost sales reveals a new survey by StrongMail of 900 …
Threat of an embedded security disaster
For many years, embedded systems have been quietly working behind the scenes of almost all modern technologies, from automobiles to factory floors to space exploration …
Scandal of snooping IT staff
Whilst you sit there innocently working away, little do you realize that a third of your IT colleagues have been snooping around the network, looking at highly confidential …
Improving bandwidth efficiency for Cisco and FortiNet firewalls
GISS has released FirePlotter version 1.4, a quick-to-install and easy-to-use Windows application that lets IT Managers, support staff and firewall engineers monitor all the …
81% of corporate PCs lack antivirus, firewall or patches
Sophos has revealed the results of its Endpoint Assessment Test, a free online scanning tool that checks endpoints for security vulnerabilities, defined as missing Microsoft …
New malicious campaign targeting Olympic games fans
Sophos is warning computer users to be on their guard against unsolicited emails following the discovery of a new malicious spam campaign that claims another earthquake has …
Choosing the Right Security Personnel
In the new edition of the HNS podcast, Simon Heron from Network Box discusses why choosing the right security personnel is every bit as important as opting for the right …
Laptops with 20,000 patients info stolen from London hospital
Sophos is reminding organisations of the risks of data loss and identity theft following news that six laptops, containing personal information about 20,000 NHS patients, have …
Trojan2Worm toolkit makes it easy to turn trojans into worms
Panda Security has detected an application whose main function is to turn an executable file into a worm, giving it the capacity to spread itself. The point-and-click toolkit …
IronDoor to set a new benchmark for secure remote access
WorldExtend launched IronDoor 3.5, a software-based solution that sets both a simplicity and affordability benchmark for secure remote access to both data and applications. …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC