Help Net Security
Seagate unveils complete SSD product line
Seagate took the wraps off its first client SSD and its next-generation enterprise SSDs. Featuring the Seagate 600 SSD, Seagate 600 Pro SSD, and the Seagate 1200 SSD, the new …
A radical shift in security needs
During the last 40 years we’ve seen a small number of significant, user-driven shifts in the computing landscape, which change the way businesses and IT departments …
Increase Facebook privacy with Safe Profile
76 percent of consumers are concerned about their privacy when they share their life on social platforms. Facebook’s array of privacy settings, which enable users to …
Analyzing 450 million lines of software code
A new Coverity report details the analysis of more than 450 million lines of software code through the Coverity Scan service. The service, which began as the largest …
Many social accounts are still in danger
The recent hacking of the Associated Press’ Twitter account has begged the question, how secure are social media accounts? A study released by IObit reveals that 30% …
Malwarebytes backup service prevents malware uploads
Malwarebytes Secure Backup, released today, is an online backup service that automatically scans files for malware prior to backup, removing the threat of saving or sharing …
Dell acquires Enstratius
Dell today announced the acquisition of Enstratius, which helps organizations manage applications across private, public and hybrid clouds, including automated application …
McAfee to acquire Stonesoft
McAfee and Stonesoft today announced a definitive agreement to initiate a conditional tender offer for the acquisition of Stonesoft for approximately $389 million in cash. …
No strategy for data protection?
While financial services organizations are obligated to establish and report stringent service availability objectives for mission-critical systems, they are actually among …
Cain & Abel 4.9.44 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Week in review: Google Glass hacked, Bitcoin risks, and why we need security awareness training programs
Here’s an overview of some of last week’s most interesting news, reviews and articles: Info of 50M LivingSocial customers compromised following breach …
Multi-stage exploit attacks for more effective malware delivery
Most drive-by exploit kits use a minimal exploit shellcode that downloads and runs the final payload. This is akin to a two-stage ICBM (InterContinental Ballistic Missile) …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days