Help Net Security
NETGEAR introduces R6100 WiFi router
NETGEAR is expanding its family of 802.11ac wireless products with the R6100 WiFi Router. The R6100 is a dual band router that supports combined WiFi speeds up to 1200 Mbps …
Protect Android devices from theft and malware
The new Norton Mobile Security with antivirus protects your Android phones and tablets from theft, loss, malware and viruses. Remotely locate your lost or stolen device. Scan …
Twitter underground economy still going strong
The Twitter underground economy and the fake social account market as a whole continues to gain momentum, and the financial motivations of this multimillion-dollar business …
Keep all your software up-to-date with F-Secure
The month of June saw security updates for well over 100 vulnerabilities in just the most commonly used software for Windows workstations, with each of these vulnerabilities …
Two-factor authentication for websites
Incapsula announced Login Protect, which enables instant activation of two-factor authentication to websites and Web applications, without requiring any coding, application …
Teaching a computer to play Memory advances security
Computer science researchers have programmed a computer to play the game Concentration (also known as Memory). The work could help improve computer security – and …
Hacker indicted for Romney tax return extortion scheme
34-year-old Michael Mancil Brown of Franklin, Tennessee, was indicted today by a federal grand jury in Nashville, for allegedly engaging in an extortion and wire fraud scheme …
Symbiotic relationship ensures malware persistence
If your antivirus solution detects the Vobfus worm and downloader on your computer, chances are good that the machine also houses the Beebone downloader, Microsoft researcher …
Protect your company from BYOD security threats
With users wanting to connect their personally owned computers to corporate infrastructure, IT admins have to find the right balance between providing services, and securing …
Combating attacks with collaborative threat intelligence
Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious …
Bruce Schneier on power and security
In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. …
Week in review: Car hacking, Opera breach, and Carberp source code leaked
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Snowden on the run, leaks continue unabated Documents he shared with …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)