Help Net Security
The social smart lock of the future
Today at the D: All Things Digital conference, designer Yves Behar and technology entrepreneur Jason Johnson launched the August Smart Lock. The intuitive new lock and access …
Automate your way out of patching hell
IT departments are often criticised for their remoteness from the business. One cause could be highlighted by recent research numbers from IDC, which found that as much as 70 …
GFI Software buys online backup vendor IASO
GFI Software acquired the online backup software company IASO, based in The Netherlands. IASO provides cloud-based solutions that provide customers with secure backup and …
Liberty Reserve laundered $6 billion through illegal transactions
An indictment has been unsealed on Tuesday charging Liberty Reserve, a company that operated one of the world’s most widely used digital currency services, and seven of …
Addonics releases CipherUSB family of hardware encryption solutions
Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …
McAfee unveils Complete Endpoint Protection suites
McAfee introduced two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. The suites include McAfee …
Backup large data with Big Cloud
Sterling Data Storage released its largest data backup solution yet — the Big Cloud. It was designed for companies needing to securely store large amounts without sacrificing …
How secure is quantum cryptography?
Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and …
DNS anomaly detection: Defend against sophisticated malware
Not so long ago, the standard way of looking for a malware infection was to simply monitor web traffic. By looking, for example, for HTTP requests to google.com/webhp – …
Plugging the trust gap
Every business and government is dependent upon cryptographic keys and certificates to provide trust for critical communications. These trust technologies underpin the modern …
Week in review: Scanner that identifies malware strains, Twitter offers 2FA
Here’s an overview of some of last week’s most interesting news, reviews and articles: The CSO perspective on healthcare security and compliance Randall Gamby is …
Killer apps: The performance of networked applications
Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …
Featured news
Resources
Don't miss
- Self-spreading npm malware targets developers in new supply chain attack
- Microsoft extends security patching for three Windows products at a price
- AI is becoming part of everyday criminal workflows
- Why SOCs are moving toward autonomous security operations in 2026
- Binding Operational Directive 26-02 sets deadlines for edge device replacement