Help Net Security
Most government CIO budgets flat or increasing in 2013
Despite a continuing drive to lower the cost of IT services, nearly 75 percent of government IT budgets globally were reported as flat or increasing in 2013, according to the …
How much confidential info is left unprotected in SharePoint?
A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and …
Protect against threats targeting Android
Palo Alto Networks’ WildFire malware analysis sandbox now is capable of analyzing Android applications in the APK file format to identify advanced threats in Android …
Fortinet expands secure application delivery product portfolio
Fortinet announced new additions to its secure application delivery product portfolio that are a result of the company’s acquisitions of Coyote Point Systems and XDN. …
Can biometrics revolutionize mobile payment security?
With the explosion in smartphones usage, the number of payments done via mobile devices has significantly increased over recent years. As eCommerce becomes mCommerce, the …
Adoption of antivirus software on mobile devices remains low
Consumer adoption and willingness to pay for antivirus software on mobile devices is low, according to Gartner. Gartner believes that high consumer use of personal mobile …
Week in review: Tor users targeted with spyware, secure mail providers close up shop
Here’s an overview of some of last week’s most interesting news, reviews and articles: Working as an ethical hacker The majority of people in the security industry …
Netwrix updates its configuration auditing software
Netwrix Corporation announced Netwrix Auditor 5.0, a configuration auditing solution for security, compliance and operations across the entire IT infrastructure. It provides …
Microsoft to release three critical fixes
The August 2013 Patch Tuesday advance notification includes a slightly higher volume of fixes than last month, but only 3 of 8 are critical, which is down from July’s 6 …
Compliance no longer main driver of security measures
The need to ensure compliance with regulations should no longer be the primary consideration of CIOs when planning IT risk and security measures. Gartner said compliance is an …
Defending against the BREACH attack
When Juliano and Thai disclosed the CRIME attack last year, it was clear that the same attack technique could be applied to any other compressed data, and compressed response …
Silent Text for Android now on Google Play
Silent Text for Android is now available for download in the Google Play store. It allows you to have secure and encrypted peer-to-peer text conversations on your mobile …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!