Help Net Security
Mac OS X and iOS Internals
Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded in mystery. Cocoa and Carbon, …
Most Android malware are SMS Trojans
Android versions 2.3.6, or ‘Gingerbread’, and 4.0.4, also known as ‘Ice Cream Sandwich’ were the most popular Android targets among cybercriminals in …
Trust in the cloud or trust in the phone: What next for mobile payments?
Thales looks at the approaches for the successful mass adoption of mobile payments among issuers, card schemes, acquirers, merchants and consumers and asks whether the arrival …
Mobile Device Management for iOS and Android devices
CoSoSys released Mobile Device Management (MDM) for iOS and Android as a new module within Endpoint Protector 4.3 including support for iOS 6. “With Mobile Device …
Radware introduces new attack mitigation solution
Radware introduced DefensePro x420, the next-generation hardware platform in the DefensePro application security suite. With the ability to handle 25 million packets per …
GateWall Mail Security
rotects corporate environments from malware threats, spam and data loss issues. This software-based solution is installed within the corporate intranet and acts as a …
Microsoft Assessment and Planning Toolkit 8.0 Beta released
The Microsoft Assessment and Planning (MAP) Toolkit’s new capabilities help you assess the readiness of your environment for deploying Windows 8 and Windows Server 2012. …
Symantec envisions safe cloud strategy
Symantec announced its vision for safe, agile and efficient clouds. In five years, companies will operate in a converged IT world of cloud, virtualization and mobile computing …
Protect web browsing sessions on iOS devices
Quarri Technologies released Quarri Protect On Q (POQ) Mobile for iOS, a web information security solution that enables organizations to protect and control end-user web …
Gartner says EMEA IT spending will grow
IT spending in Europe, the Middle East and Africa (EMEA) will reach $1.154 trillion in 2013, a 1.4 percent increase from 2012 projected spending of $1.138 trillion, according …
PHD Virtual unveils enterprise backup solutions
PHD Virtual Technologies announced their solutions are well-suited for large enterprise environments as well as small businesses with growing data storage, backup and recovery …
Life cycle and detection of an exploit kit
As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)