Help Net Security
Privacy: Erase Your Hard Drive
You may not be aware of this, but merely erasing your data the regular way does not make it disappear for good. Some of it can still be retrieved with the use of recovery …
New minimum standard for software development security
The SANS Institute released its first proposed standard for software developers to demonstrate they have the skills and knowledge to write secure software. This standard, …
Monitor websites and servers for changes or failures on your Mac
Dejal today released Dejal Simon 2.3.5, a site monitoring tool for Mac OS X. It checks web pages, FTP and DNS servers, local or remote ports or volumes, and other services for …
Impact of phishing on the reputation of brands
Cloudmark announced the results of a survey conducted on its behalf by YouGov, which revealed that public confidence in consumer brands is dramatically affected by phishing …
5 key steps to mitigate data protection risk
As well as the remediation costs associated with the loss of data in terms of litigation, penalties and time, the brand damage resulting from an information security failure …
Network Access Control (NAC)
The three cardinal questions for security compliance, which every network administrator and owner endeavour to answer are: How do I stop unauthorized users and endpoints from …
85% of public lack confidence in local authority’s computer security
Sophos has revealed that 85 percent of users of online government services believe that their local authority’s IT systems have probably already suffered a security …
Security Plugins for Movable Type
Movable Type is a popular weblog publishing system that supports a variety of plugins. This article lists some very useful security-oriented plugins that can enhance your …
Digital media distribution could prevent security breaches and data theft
The disastrous loss of 25 million UK citizens’ personal details need not have happened if the information had been handled using a secure digital delivery system. …
Safeguard Your Organization with Proper Password Management
Access control is one way to ensure security in your organization. An intruder can break into your network by compromising accounts with weak passwords. If the compromised …
Mac Security Freeware: Confidential Data Manager and Password Storage Utility
In a series of articles on Mac security freeware I will be covering a number of newly released security tools for Mac OS X. This time I am taking a look at two confidential …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous