Help Net Security
Top 5 security threats for 2013
The Information Security Forum announced their forecast of the top five security threats businesses will face in 2013. Key threats include cyber security, supply chain …
Android security and optimization app
IObit released its Android security and optimization app – Advanced Mobile Care, designed for Android 2.2 and above. The app gives Android users a way to protect their …
Entrust solves SSL compliance challenges
Finding, managing and analyzing SSL and other digital certificates can be time-consuming, complex and expensive. To help automate and simplify these tasks, Entrust introduces …
Virtualization Security: Protecting Virtualized Environments
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and …
Five priority areas for future U.S. homeland security focus
On the heels of the tenth anniversary of the creation of the U.S. Department of Homeland Security (DHS), Booz Allen Hamilton outlined five priority areas for the next decade …
Real-world cyber city used to train cyber warriors
SANS announced NetWars CyberCity, a small-scale city located close by the New Jersey Turnpike complete with a bank, hospital, water tower, train system, electric power grid, …
Most Americans uninformed about DDoS attacks
Whether motivated by an extreme form of free expression or criminal intent, distributed denial-of-service attacks (DDoS attacks) are increasingly commonplace worldwide. Yet …
Webroot adds anti-phishing to Web Security Service
Webroot announced the integration of anti-phishing capabilities into the Webroot Web Security Service, a cloud-based security service. The challenges in the detection of …
Fraud 101 for universities
“Colleges and universities are becoming more aware of the fraud threats they face, but there is still a lot of room for educating the educators,” says James Gifas, …
Dell updates cloud software for iPad and Windows RT
Dell announced enhancements to its PocketCloud app portfolio, which enables users to easily create a “personal cloud” to search, view, organize, and share content …
Xen Cloud Platform 1.6 released
Xen Cloud Platform is a virtualization platform for companies to create and manage virtual infrastructures for servers, desktops and clouds. XCP 1.6 strengthens its server …
SCADA software bugs leave national critical infrastructure vulnerable
This week, 23 vulnerabilities in industrial control software – specifically SCADA software – from several vendors have reportedly been found by a researcher at …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation