Help Net Security
Microsoft Virtual Machine Servicing Tool 2012 released
Virtual Machine Servicing Tool (VMST) 2012 is designed to work with System Center 2012 -Virtual Machine Manager (VMM), System Center 2012 Configuration Manager and Windows …
More than half of employees fail to protect their data
A ComRes poll revealed that while 71% of employees have been able to see or read what someone is working on over their shoulder, 53% do not always take precautions to protect …
Coud-based security service for iOS devices
Websense released the new TRITON Mobile Security solution, a cloud-based security service for iOS devices on wireless mobile networks. It combines four key elements for …
vCat for Mobile: Mobile network emulation tool
Shunra announced vCat for Mobile, a network virtualization and application performance engineering solution designed specifically to help organizations test, validate, and …
Tenable Network Security updates vulnerability management solution
Tenable Network Security announced SecurityCenter Continuous View, a vulnerability management solution that provides real-time, continuous vulnerability, configuration, and …
Week in review: Gizmodo, Reuters, Blizzard hacks, and the underground economy of social network
Here’s an overview of some of last week’s most interesting news and articles: “Microsoft support” scammers still cold calling users The old …
Free cleanup tool for Morcut malware targeting Macs
MacClean is a free clean-up solution designed for Apple fans that may be infected by the Morcut malware. Once downloaded, this easy-to-use tool scans your Mac and alerts you …
Andy Murray is the most dangerous British athlete in cyberspace
Tennis player Andy Murray has topped a list of the most dangerous British athletes to search for on the web, according to McAfee. Following on from the annual McAfee Most …
10 steps to ensure users only access what they need
Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …
Stuxnet cousin able to attack industrial control systems
Today, extensive analysis on a new cyber espionage weapon dubbed “Gauss’ has been released, stating that the tool has capabilities to attack national critical …
Microsoft to release nine bulletins on Tuesday
For the second month running, Microsoft’s Patch Tuesday Advanced Notification includes nine bulletins. This month, five are rated “critical’ and four …
NIST updates guide for dealing with computer security incidents
The National Institute of Standards and Technology (NIST) has published the final version of its guide for managing computer security incidents. Based on best practices from …
Featured news
Sponsored
Don't miss
- Chrome, Edge users beset by malicious extensions that can’t be easily removed
- Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)
- Scout Suite: Open-source cloud security auditing tool
- Steps to improve quality engineering and system robustness
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)