Help Net Security
Computer forensic examiners are from Mars, attorneys are from Venus
The outcome of high stakes investigations and litigation can often depend on the evidence uncovered through computer forensic investigation. That fact highlights the critical …
Malware analysis: Collaboration, automation and training
Whether you’re a novice or a professional at analyzing malicious code, you’ll have a desire to learn or pass on that skill. Most malicious code analysis is …
Federal agencies willing, but not ready, for Big Data
More than 75 percent of federal managers believe Big Data has the power to fundamentally transform federal operations, according to the Government Business Council (GBC) and …
Cisco redesigns CCNA routing and switching certification
Cisco today announced a redesign of the Cisco associate-level certification programs and the evolution of the CCNA certification to CCNA Routing and Switching certification. …
Fraud detection solutions for online retailers
ID Analytics introduced a suite of fraud detection solutions that allows online retailers to use more than standard rules and their own transactional data to help drive …
Cloud-based tool simulates social engineering
TraceSecurity launched the TraceSecurity Phishing Simulator, a secure, cloud-based solution that allows organizations to safely perform on-demand social engineering tests that …
New IronKey secure USB flash and hard drives
Imation expanded the IronKey secure USB product line with new hardware encrypted flash and external hard disk drives. The IronKey D80 flash drives and H80 hard drives enable …
European ATM Security Team on fraud losses
European ATM Security Team (EAST) has published its first European Fraud Update for 2013. This is based on country crime updates given by representatives of 21 countries in …
Privacy-enhanced identity and authentication platform
SecureKey announced its cloud-based briidge.net identity and authentication platform – a solution that enables people to use devices and credentials they already have to …
Real-time apps and FTP are preferred malware targets
Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …
Targeted attacks and real world hacks
Web application attacks are the most significant security threat for IT infrastructures, according to Alert Logic. During a six-month study period, Alert Logic found that 48 …
PrivacyScan expands cleaning support for Internet and desktop apps
PrivacyScan 1.2 is now available in the Mac App Store with updated privacy cleaning features and support. PrivacyScan protects online and offline privacy by shredding files …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)