IBM to acquire Q1 Labs
IBM announced a definitive agreement to acquire security intelligence software provider Q1 Labs. The move aims to accelerate IBM’s efforts to help clients more …
Anti-theft protection for Android and Windows devices
Norton Anti-Theft is a new Web-service that allows consumers to remotely lock, locate and recover a lost or stolen Windows based laptop, or Android smartphone or tablet. The …
McAfee to acquire NitroSecurity
McAfee announced a definitive agreement to acquire privately owned NitroSecurity, a provider of SIEM solutions that provide visibility and situational awareness. NitroSecurity …
Critical vulnerabilities in Adobe Photoshop Elements 8
Critical vulnerabilities exist in Adobe Photoshop Elements 8.0 and earlier versions. These two buffer overflow vulnerabilities (CVE-2011-2443) could cause a crash and …
FFmpeg multiple vulnerabilities
Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a Denial of Service and potentially compromise a user’s …
Webroot SecureAnywhere integrates PC, Android and iOS security
Following Kaspersky One and McAfee All Access, Webroot announced centralized security management for PC, Android and iOS users. Webroot SecureAnywhere enables users to manage …
Suspect cyberbullying? Here’s five tips on what to do
Most parents know that when a bullying incident occurs with their child, they should address it immediately. In the case of cyberbullying, online tools are now available to …
Trend Micro Deep Security Parns Common Criteria EAL 4+ certification
Trend Micro announced that its advanced server and virtualization security solution, Deep Security achieved Common Criteria Evaluation Assurance Level 4 augmented (EAL 4+) …
Win a free ticket to RSA Conference Europe 2011
RSA Conference Europe 2011 is scheduled to be held in London on October 11-13, and Help Net Security is offering a free ticket to the event for one lucky reader. RSA …
Picasa Web Albums and Yahoo! Groups are loved by spammers
Cyber crooks and spammers are always on the lookout for ways to reach and victimize the largest amount of individuals possible. And sometimes even Internet giants such as …
Law enforcement increasingly asking Internet companies to share data
The fact that one can find out a lot about a person’s interests, movements and opinions from their Facebook and Twitter accounts, Google searches and messages exchanged …
iPhone 5 spam emails lead to malware
Apple is expected to unveil the next iteration of its popular iPhone during a press event scheduled for tomorrow (October 4). As the excitement regarding the release of the …
Featured news
Resources
Don't miss
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
 - How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI