Help Net Security
Intigua: Automate the provisioning of management technologies
CIOs today are asking their IT teams to build private clouds that reflect the on-demand simplicity and agility that Amazon Web Services delivers in its public cloud. Unlike …
Microsoft releases critical fixes for IE and Exchange Server
There’s a remotely exploitable, publicly disclosed, critical remote code execution vulnerability in Microsoft Exchange (MS13-061)! But wait, is it really remotely …
Hacking a smart lightbulb system
The phenomenon of the Internet of Things (IoT) is positively influencing our lives by augmenting our spaces with intelligent and connected devices. Examples of these devices …
Most government CIO budgets flat or increasing in 2013
Despite a continuing drive to lower the cost of IT services, nearly 75 percent of government IT budgets globally were reported as flat or increasing in 2013, according to the …
How much confidential info is left unprotected in SharePoint?
A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and …
Protect against threats targeting Android
Palo Alto Networks’ WildFire malware analysis sandbox now is capable of analyzing Android applications in the APK file format to identify advanced threats in Android …
Fortinet expands secure application delivery product portfolio
Fortinet announced new additions to its secure application delivery product portfolio that are a result of the company’s acquisitions of Coyote Point Systems and XDN. …
Can biometrics revolutionize mobile payment security?
With the explosion in smartphones usage, the number of payments done via mobile devices has significantly increased over recent years. As eCommerce becomes mCommerce, the …
Adoption of antivirus software on mobile devices remains low
Consumer adoption and willingness to pay for antivirus software on mobile devices is low, according to Gartner. Gartner believes that high consumer use of personal mobile …
Week in review: Tor users targeted with spyware, secure mail providers close up shop
Here’s an overview of some of last week’s most interesting news, reviews and articles: Working as an ethical hacker The majority of people in the security industry …
Netwrix updates its configuration auditing software
Netwrix Corporation announced Netwrix Auditor 5.0, a configuration auditing solution for security, compliance and operations across the entire IT infrastructure. It provides …
Microsoft to release three critical fixes
The August 2013 Patch Tuesday advance notification includes a slightly higher volume of fixes than last month, but only 3 of 8 are critical, which is down from July’s 6 …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground