Help Net Security
Study connects cybercrime to job loss
After years of guesswork and innumerable attempts to quantify the costly effects of cybercrime on the U.S. and world economies, McAfee engaged the Center for Strategic and …
Multiple Java versions on endpoints risky for enterprises
Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …
New ReadyNAS rackmount devices from NETGEAR
NETGEAR announced ReadyNAS 3220 and ReadyNAS 4220, the latest NAS products to run on the ReadyNAS OS, introduced in March 2013. Available in 2U rackmount form with 12-bay …
Apricorn unveils FIPS 140-2 encrypted USB 3.0 drive
Apricorn debuted its Aegis Padlock Fortress, a secure drive designed specifically for the stringent requirements of the Government, Military and Healthcare. The first USB 3.0 …
BT Security CEO to keynote RSA Conference Europe 2013
RSA Conference announced BT Security CEO Mark Hughes as a keynote speaker for the 14th annual RSA Conference Europe, taking place from 29 – 31 October 2013, at Amsterdam …
Week in review: Hijacking connected cars, Android backup flaw, help desk security threats
Here’s an overview of some of last week’s most interesting news and articles: UEFI secure boot: Next generation booting or a controversial debate One of the first …
Major vulnerabilities in office security and RFID systems
At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and …
ISACA updates IS Audit and Assurance Standards
ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards have an effective date of 1 November 2013. Introduced in 1988, the IS Audit and …
File infector EXPIRO hits US, steals FTP credentials
An unusual attack has been spotted in the wild, using an unexpected combination of threats. This attack used exploit kits (in particular Java and PDF exploits) to deliver file …
Bank security breaches destroy customer trust
85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, …
Switch secures confidential data on separate networks
Belkin expanded its secure product line with the addition of the Belkin DisplayPort KVM Switch. The new switch offers the ideal solution for federal and defense users who …
Tripwire updates Log Center solution
Tripwire announced the availability of its Log Center TLC 7.0 featuring the first phase of integration with IP360, as well as Tripwire’s new VIA Agent, log intelligence, …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation