Help Net Security
Video: Smart TV 0-day vulnerability
This video by ReVuln demonstrates a 0-day vulnerability in Smart TV, in this case a Samsung TV LED 3D. Smart TV can be used to browse the Internet, use social networks, …
Smart grid ICS cyber security market to grow
Smart grid industrial control systems (ICS) remain in a state of flux. Security is still viewed as a cost-limitation exercise by many utilities, and advances toward meaningful …
McAfee mobile security app gets new privacy technology
McAfee released an enhanced version of McAfee Mobile Security featuring App Lock, an app privacy technology, as well as a completely refreshed user interface. The security …
Rapid7 updates vulnerability management solution
Rapid7 announced that the new capabilities of its vulnerability management solution, Nexpose, simplify the challenge of IT security risk management. Nexpose 5.5 introduces new …
Ultra-secure memory sticks with anti-malware features
Kingston Digital has partnered with ESET and ClevX. The combination extends ClevX DriveSecurity powered by ESET’s proactive portable anti-malware technology to …
Panda Cloud Antivirus 2.1 released
Panda Security launched Panda Cloud Antivirus 2.1. The product incorporates new anti-exploit technologies, in both its free and pro editions, which detect and neutralize …
200,000 new malicious programs detected every day
Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012. The report revealed significant growth …
Most prevalent threat detections of the holiday season
In November, GFI threat researchers encountered email threats disguised as notices from American Express, DHL and UPS as the holiday season kicked into full gear, as well as a …
Proprietary platforms to cause complexity in 2013
Citrix predicts that the rise of consumerisation and the Bring-Your-Own (BYO) phenomenon will force IT departments to focus on the challenge of apps and data governance. 2012 …
Reflecting on 2012: Cyberwar, next generation firewalls and compliance
Historically security products have been developed either in response to, or in anticipation of, major shifts in enterprise computing – or at least that’s been my …
Motives behind IT budget spend and 2013 cloud trends
A global survey of 550 CIOs, IT Directors, and senior IT managers has confirmed motives behind their IT budget spend in 2012, while revealing the rate of cloud adoption in …
Wi-Fi operating system ArrayOS gets new features
Wick Hill announced a new release of the ArrayOS operating system for Xirrus Wireless Arrays. Xirrus AOS 6.3 provides an advanced Wi-Fi operating system for optimizing the …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring