Help Net Security
Social networking is the #1 risk to information security
The consumerisation of IT has made security far more difficult to manage according to research published by McAfee at its Security Summit in London. This is exemplified by the …
Trusted deployment of personal data to boost growth in the European economy
The effective and trusted deployment of personal data could be a boon to consumers and a source of massive growth in the European economy, but only if public and private …
Updated SkyBox risk and compliance management solutions
Skybox Security added new capabilities to Firewall Assurance 6.5 and Network Assurance 6.5 that make it easier for security managers to see, analyze and take action to secure …
Symbian malware scene far from dead
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Symbian threats. Despite …
Android malware continues to dominate the mobile threat landscape
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Android threats. As expected, …
New IronKey hardware-encrypted secure flash drives
Imation Corp. announced the availability of two new IronKey hardware-encrypted rugged flash drives – S250 and D250 . The IronKey flash drives deliver powerful protection …
IT in the organization: four possible scenarios for the future
The changing shape of IT is causing CIOs to question the role of IT in the organization. As businesses confront global economic uncertainty, changing market dynamics and …
Adobe Reader 0-day exploit sold for $50,000
The good news is that the exploit costs $50,000 which limits the purchase of it to defense contractors, nation states and some criminal organizations that may be able to …
Video demonstration: New Adobe Reader zero-day exploit
Russian based security company Group-IB announced a new zero day vulnerability in Adobe Reader 10 and 11. According to their research, the exploit bypasses Reader’s …
New batch of Trusted Computing Group certified products
Trusted Computing Group has recently certified four products, including a Trusted Platform Module (TPM) and three products supporting the group’s security automation …
YubiKey NEO authentication token released
Yubico announced the production launch of the YubiKey NEO, a new authentication token that features Near Field Communications (NFC) technology, asymmetric cryptography support …
Secure View 3 recovers deleted data from Android phones
Susteen’s Secure View 3 digital forensics product is now able to recover deleted data from the large majority of Android phones. Law enforcement, military and government …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground