Help Net Security
Qualys adds IPv6 support to FreeScan
Qualys announced at Security B-Sides Las Vegas that FreeScan – a popular free service that allows organizations to scan web sites or publicly facing IP addresses for …
Cybercriminals use social engineering to extend lifecycle of malware
Android smartphone users remain a lucrative target as the platform currently has 59 percent global market share and is on track to stay the most shipped mobile operating …
Hidden security risks of top mobile apps
Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …
What will the workplace of the future look like?
IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …
Location tracking becomes more attractive
In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …
CryptoAuditor: Privileged user access auditing
SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with …
Novell makes BYOD enterprise ready
Novell announced the availability of ZENworks Mobile Management, which addresses the pain points device administrators and managers face today, including BYOD (bring your own …
Safe C++: How to avoid common mistakes
It’s easy to make lots of programming mistakes in C++. In fact, any program over a few hundred lines is likely to contain bugs. With this book, you’ll learn about …
Apple releases OS X Mountain Lion
Apple announced that OS X Mountain Lion, the ninth major release of its desktop operating system, is available as a download from the Mac App Store, available as an upgrade …
Scientists develop tool for improving app security
A team led by Harvard computer scientists, including two undergraduate students, has developed a new tool that could lead to increased security and enhanced performance for …
Sharp rise in SQL injections
FireHost revealed the latest statistical analysis of attacks successfully blocked by its servers. During the period of April to June 2012, web applications, databases and …
Microsoft Security Toolkit delivers new defensive technology
Microsoft’s Trustworthy Computing Group today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which includes new Return Oriented …
Featured news
Sponsored
Don't miss
- Chrome, Edge users beset by malicious extensions that can’t be easily removed
- Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)
- Scout Suite: Open-source cloud security auditing tool
- Steps to improve quality engineering and system robustness
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)