Help Net Security
Open source self-service cloud portal
ScaleXtreme released free open source software for companies to build internal cloud dashboards and self-service portals for developers and other end-users. The technology …
How to prevent a botnet infection?
The research team at e-mail security provider Eleven, published five tips today to help users prevent a botnet infection on their computer. Botnets are groups of hijacked …
Dissatisfaction with the current state of backup
ExaGrid Systems announced the results of a survey of 1,200 IT managers which shows widespread dissatisfaction with the capabilities of many existing backup systems to keep up …
Most 5 year olds already use an Internet enabled device
Children as young as five have easy access to an internet enabled device. A One Poll study of 2,000 parents of children aged 5 to 15 also shows six parents in ten frequently …
F-Secure Mobile Security protects Android TVs and set-top boxes
F-Secure launched a new version of F-Secure Mobile Security which features support for standard Android devices including TVs and set-top boxes. The new version also comes …
eIQnetworks releases next generation SIEM
eIQnetworks announced SecureVue NGS, a next-generation SIEM solution that provides log management, event management, network behavioral analysis and intelligent security …
Mobile banking trends and hidden risks
While mobile banking apps are growing quickly in popularity, 68 percent of smartphone owners who have not yet adopted these apps are holding back due to security fears, while …
Solutions for application and network performance management
AppNeta launched its unified solutions for End User Experience Monitoring including full-stack application performance tracing and network performance insight. As business …
DellKACE unveils appliance for improved endpoint security
Dell KACE unveiled the latest version of the Dell KACE K1000 Management Appliance, which includes expanded visibility into the network through support for new operating …
Top words cybercriminals use in fake emails
The top words cybercriminals use create a sense of urgency, to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional …
Ethics of Big Data
What are your organization’s policies for generating and using huge datasets full of personal information? Ethics of Big Data examines ethical questions raised by the …
Big Data grows as data security shrinks
A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of “Big Data,” most organisations are actually keeping looser tabs …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days