Help Net Security
Employees use file sharing services despite bans
Large numbers of employees use Dropbox and other consumer file sharing services for sensitive work-related data, even if they know that their employer has a specific policy …
Would you dump your network provider after a security breach?
Compromised security – rather than high monthly fees – would be the biggest catalyst for triggering UK smartphone users to change mobile network providers. The …
Security experts debate moving critical infrastructure online
Paul Simmonds, Co-Founder of The Jericho Forum, has suggested that companies attempting to reduce costs by moving critical systems online could be opening themselves up to …
CompTIA A+ Complete Lab Manual
Designed to complement CompTIA A+ Complete Study Guide, this hands-on companion book takes you step by step through the tasks a PC technician is likely to face on any given …
Week in review: SANS’ real-world cyber city, and the return of an aggressive autorun worm
Here’s an overview of some of last week’s most interesting news and articles: eBay patches two critical security flaws on US website Two critical vulnerabilities …
Personal data of 235,000 WCSU students exposed
Western Connecticut State University has begun notifying students, their families, and individuals who had other associations with the university that their personal …
Nmap 6.25 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Shylock’s new trick for evading malware researchers
Shylock is a financial malware platform discovered by Trusteer in 2011. Like most malware strains, Shylock continues to evolve in order to bypass new defensive technologies …
Mobile and cloud developments will dominate 2013
For the past several years, the IT industry’s transition to the 3rd Platform, built on mobile computing, cloud services, social networking, and big data analytics …
Metaforic releases software protection technology
Metaforic unveiled several new technology advancements that make it easier for software creators to protect a wide range of software (mobile, embedded, desktop, server) …
AVG releases Safe Browser for iOS, updates AntiVirus for Android
AVG updated its AntiVirus for Android and launched the new AVG Safe Browser for iOS. The main eye catcher in AVG AntiVirus for Android version 3.0.2 is the new user interface. …
Mobile communications hub with embedded encryption
API Technologies announced the new SST Secure Communications Hub (SCH) with integrated encryption. The SB1500ER Secure Communication Hub is a single, integrated device that …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)