Help Net Security
Unlocking MS Office 2007/2010 documents
Cloud-based password unlocking service Password-Find introduced a new decrypting algorithm that unlocks half of Microsoft Office 2007/2010 Word, Excel, and PowerPoint …
Encrypted e-mail service from Silent Circle
Silent Circle announced the availability of the company’s new Silent Mail e-mail encryption service. Silent Mail addresses longstanding problems with e-mail encryption: …
Free endpoint backup for small teams
Druva introduced free IT-managed endpoint backup for groups of up to 15 users with a new edition of Druva inSync, its integrated suite of backup, file sharing, data loss …
How financial institutions can overcome the cloud security barrier
In financial services, with the hundreds of complex regulations that apply to data, private cloud adoption is still more common than the public cloud to date. However, that is …
IT decision makers mark increase in security-related incidents
More than one-third of surveyed European enterprises (36%) have experienced an increase in the frequency of network and data security-related incidents in the last 18 months, …
Most corporate computers missing critical software updates
87 percent of corporate computers are missing critical software updates that could threaten business security, according to F-Secure data from around 200,000 workstations …
AlienVault releases USM virtual appliance
AlienVault released its AlienVault Unified Security Management (USM) virtual appliance, a collection of open source tools for asset discovery, vulnerability assessment, threat …
Average DDoS attack bandwidth up 718 percent
The average DDoS attack bandwidth in Q1 2013 totaled 48.25 Gbps, which is a 718 percent increase over last quarter, and the average packet-per-second rate reached 32.4 …
Oracle plugs a host of critical Java vulnerabilities
Oracle’s Java SE Critical Patch Update for April 2013 contains 19 CVEs with CVSS base score of 10 (the highest you can go) indicating that exploiting the vulnerability …
A guide to negotiating and assuring cloud services
How can an organization safely adopt cloud services to gain the benefits they provide? The easy availability of cloud services has sometimes led to line of business managers …
Insider threats and BYOD still a great problem
Insider threats are the greatest concern and that permitting employees to connect their own devices to the network increases the risk of security breaches, according to …
Big data drives big demand for storage
As demand for Big Data technology and services continues to escalate, all levels of the Big Data technology stack will experience significant growth. Storage is a critical …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days