Help Net Security
June 2008 cyber threat forecast
MX Logic today published a new monthly report that aims to help inform organizations about potential email and Web threats in advance so they can take preventative action. In …
Free utility for improving security of VMware ESX Hypervisor deployments
Tripwire ConfigCheck is a free utility that quickly assesses configuration settings for the VMware ESX hypervisor and recommends steps to take to ensure even greater security. …
Vulnerability found in the latest Symbian operating system
It is now possible for mobile phone hackers to bypass the security system of the Symbian OS 9 based S60 3rd Edition phones with a mobile application. Symbian OS 9 based S60 …
Network security market softer than usual in North America
Infonetics Research says in a new report that the worldwide network security appliance and software market is down 4% to $1.3 billion from 4Q07 to 1Q08, primarily due to …
Politically motivated Distributed Denial of Service attacks
In the new edition of the HNS podcast Dr. Jose Nazario, Arbor Networks senior security researcher, talks about politically motivated DDoS attacks around the world.
New SecureZIP brings public key cryptography to everday users
According to its developers, new SecureZIP for Windows Desktop version 12.1 revolutionizes public key cryptography by making it available to and easily used by businesses and …
Most dangerous domains to surf and search on the web
Hong Kong (.hk) domain has jumped 28 places as the most dangerous place to surf and search on the web according to a new McAfee report called “Mapping the Mal Web …
Full guide on Mac OS X 10.5 Leopard security configuration
This guide provides an overview of features in Mac OS X that you can use to enhance security and harden your computer. In the paper, you can read instructions and …
New Payment Card Industry compliance solution
Tufin Technologies today announced a new PCI Compliance solution as part of its SecureTrack security operations management product. It provides a comprehensive PCI-DSS Audit …
Top ten ID theft safety tips from the experts
By the time you finish reading these tips, another 100 American identities will be stolen. ID theft tops the list of consumer complaints at the Federal Trade Commission (FTC). …
Securely upload, store and manage files via a bank’s online portal
Research has demonstrated that customers’ overall satisfaction rating with a bank is dependent on their impression of the usefulness of the bank’s website. As a …
Secure remote access for Apple iPhone from Check Point
Check Point announced Check Point VPN-1 support for the Apple iPhone, allowing secure remote access to corporate network systems. Check Point VPN-1 enables an encrypted …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems