Help Net Security
Tips for removing data from mobile devices
AVG released tips on how consumers can remove their personal data before they recycle or throw away their old smartphones. In an era of frequent and seamless device upgrades, …
Microsoft releases four critical bulletins
In terms of volume, the March Patch Tuesday is about average, with seven bulletins — four rated “critical” and three rated “important.” In …
Trend Micro introduces new end user protection suite
Trend Micro announced a new suite – Trend Micro Enterprise Security and Data Protection – designed to help companies efficiently mitigate the risks of attacks and …
First direct silicon-to-photonics-based router family
Compass-EOS announced r10004, the first in a family of next-generation, core-grade modular routers. The r10004 is three times smaller than comparable core routers and supports …
2013 will be the year of larger scale big data adoption
After a few years of experimentation and early adopter successes, 2013 will be the year of larger scale adoption of big data technologies, according to Gartner, Inc. According …
Tripwire acquires nCircle
Tripwire has entered into a definitive agreement to acquire nCircle. The acquisition is expected to close in April and is subject to the customary closing conditions. The …
Consumers don’t trust banks with personal data
Banks top the list of organizations consumers trust least with their personal data, according to a survey of 2,000 UK consumers. Mobile phone operators and retailers also fare …
Improving the security for Android embedded systems
McAfee has delivered a whitelisting security solution for Android based embedded systems. McAfee Application Control for Android resides in the Android kernel, embedded in the …
DataMotion releases email encryption service
DataMotion announced SecureMail Automation, an email encryption service that automates secure digital message distribution for a range of business applications that send large …
15 percent of companies have no BYOD policy
ThreatMetrix announced results of a study that surveyed U.S. business managers and IT executives within retail and financial services organizations on their level of …
Week in review: Evernote breached, Java woes and cloud security
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Evernote breached, forces service-wide password reset The …
Malware peddlers exploit death of Hugo Chavez
As predicted, the death of such a well-known and controversial politician as the Venezuelan President Hugo Chavez has been exploited by cyber criminals to lead users to …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does