Help Net Security
(IN)SECURE Magazine Infosecurity Europe special issue released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. This year’s Infosecurity Europe conference and …
Consumers have little security concern with BYOD
Despite the rise in the use of personal devices for business use, U.S. consumers are showing scant concern for security when it comes to BYOD. According to a recent survey by …
Mac adware removal tool
Bitdefender has released the Bitdefender Adware Removal Tool to remove adware such as Genieo that can alter users’ search results, inject ads and monitor visited web …
NIST’s cryptographic material under review
The National Institute of Standards and Technology (NIST) announced that its primary advisory committee, the Visiting Committee on Advanced Technology (VCAT), has begun its …
Online on-demand web penetration testing service
High-Tech Bridge announced the general availability of ImmuniWeb – its web application and website security testing SaaS that enables anyone, regardless of company size, …
SanDisk unveils security-certified self-encrypting X300s SSD
SanDisk unveiled the company’s first, self-encrypting solid state drive (SSD) – the SanDisk X300s SSD. Leveraging TCG Opal 2.0 and Microsoft Encrypted Hard Drive …
Cybercriminals targeting unlikely sources to carry out high-profile exploits
Cybercriminals continuously discover more ways to successfully target new outlets for financial theft, according to Trend Micro. Greed is motivating cybercriminals to take a …
LanGuard 2014 R2 comes with enhanced vulnerability assessment, patch management
GFI Software released GFI LanGuard 2014 R2, the latest version of the company’s comprehensive network vulnerability scanning and patch management solution. This next …
Average enterprise generates 10,000 security events daily
Damballa released its Q1 2014 State of Infections Report, compiled from analysis of 50% of North American ISP Internet traffic and 33% of mobile traffic, plus large volumes of …
Arrests in international voice-phishing case
Belgian and Dutch judicial and law enforcement authorities, supported by the European Cybercrime Centre (EC3) at Europol and Eurojust, have concluded an operation resulting in …
NIST guidelines help developers build security in from the start
A new initiative by computer security experts at the National Institute of Standards and Technology (NIST) seeks to bring widely recognized systems and software engineering …
The evolution of an Iranian hacker group
Iran-based hacker groups have traditionally concentrated more on website defacement and DDoS attacks aimed at making a political statement, but as time passes, some of those …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security