Help Net Security
Qualys executives and researchers at RSA Conference 2013
Here’s a complete list of what Qualys executives and researchers will present during RSA Conference 2013, taking place this week in San Francisco. The Hyperconnected …
Pwn Pad: A tablet for penetration testers
At the RSA Conference 2013 in San Francisco, Pwnie Express released the Pwn Pad, a tablet loaded with wired and wireless pentesting tools. The Pwn Pad contains bleeding edge …
A framework for building privacy-oriented apps
At the RSA Conference 2013 in San Francisco, SpiderOak announced it is launching privacy into the mainstream with the unveiling of Crypton, a “zero-knowledge” …
Week in review: Facebook, Apple hacks, APT1, and mobile phishing
Here’s an overview of some of last week’s most interesting news, reviews and articles: Facebook employees ambushed by zero-day exploit Facebook has admitted that …
Real world social engineering challenge at HITBSECCONF2013
Global IT services provider Sogeti will launch their social engineering challenge during the Hack In The Box Amsterdam conference in April. The challenge will be to social …
Hidden security threats on enterprise networks
Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …
Silent Text iOS app can auto-delete sent messages
Silent Circle announced features in the company’s updated Silent Text secure messaging app for iOS. Customers can now: Send private encrypted messages and use Silent …
IBM shows where vulnerabilities appear in iOS apps
IBM announced security software that helps organizations proactively reduce the security risk to iOS enterprise apps. Clients will be able to build security testing into the …
ESET releases two-factor authentication software solution
ESET announced the availability of ESET Secure Authentication, a two-factor authentication (2FA) software solution for SMBs that makes use of remote end-users’ mobile …
IS Decisions releases FileAudit 4
IS Decisions released FileAudit 4, its file audit, archiving and reporting tool. It is the only file auditing solution Microsoft-certified for compliance with Windows 8 and …
Citrix introduces XenMobile MDM
Citrix announced XenMobile MDM, an enterprise mobile device management solution that gives users device choice while also enabling IT to meet its management and compliance …
Malicious URLs eclipsing botnets as malware distribution leader
McAfee Labs revealed that sophisticated attacks originally targeting the financial services industry are now increasingly directed at other critical sectors of the economy, …
Featured news
Resources
Don't miss
- Security work keeps expanding, even with AI in the mix
- Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
- Google disrupts proxy network used by 550+ threat groups
- eScan AV users targeted with malicious updates
- Google agrees to pay $135 million over Android data harvesting claims