Help Net Security
Proof-based system to secure the car
The digital systems in today’s connected car, including engine, infotainment and telematics systems, provide communications, numerous conveniences, information, safety, …
What CISOs must learn from Bitcoin and a research team at Georgia Tech
It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. …
Free eBook: First Aid Kit for Sys Admins
Have you faced any of these situations: malware infection, cracked passwords, defaced website, compromised DNS, licensing violations, stolen hardware and other issues which …
Secure mobility assessment tool
Mobile Work Exchange, a public-private partnership focused on demonstrating the value of mobility and telework, launched the Secure Mobility Hot Zone, which includes a …
SolarWinds Server & Application Monitor 6.0 released
SolarWinds released SolarWinds Server & Application Monitor (SAM) 6.0, designed to deliver agentless performance and availability monitoring, alerting and reporting for …
Week in review: Backdoored NIST standard revealed, Java’s new whitelisting feature, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: How important is penetration testing? With cyber attacks becoming the norm, it is …
US Internet users less vigilant than ever about their online safety
As the Internet has become a ubiquitous part of life, US consumers are less vigilant about protecting their safety online, says this year’s Microsoft Computing Safety …
IT pros lack support to manage security intelligence
SolarWinds, in conjunction with SANS, today released the results of a security survey of more than 600 IT professionals representing a broad range of industries and …
Medical identity theft affects 1.84 million U.S. victims
Medical identity theft is a national healthcare issue with life-threatening and hefty financial consequences. According to the 2013 Survey on Medical Identity Theft conducted …
Most companies choose on-premise private cloud deployments
87 percent of IT professionals currently leveraging private cloud solutions indicate that their companies host clouds on-premises rather than with third-party providers, …
Tenable release Passive Vulnerability Scanner 4.0
Tenable Network Security’s Passive Vulnerability Scanner (PVS) 4.0 is now generally available as a standalone product. Already available as part of Tenable’s …
Safeguard your info and monitor Facebook activity with BullGuard Identity Protection
BullGuard released BullGuard Identity Protection, a new suite of security tools designed to guard against the growing number of threats that target internet and social media …
Featured news
Resources
Don't miss
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)
- Cybercriminals are scaling phishing attacks with ready-made kits
- StackRox: Open-source Kubernetes security platform
- What happens to insider risk when AI becomes a coworker