Help Net Security
Bank robbery 2.0: Online banking in the sights
There are very few technologies that have affected our everyday lives as much as the Internet. It has changed the way we communicate in many ways and has revolutionized …
Global dashboard for monitoring the quality of SSL support
Last week we announced SSL Pulse, a continuously updated dashboard that is designed to show the state of the SSL ecosystem at a glance. While it is possible today to deploy …
Securing smartphones and tablets against banking fraud
Trusteer announced a new version of the Trusteer Mobile service which prevents mobile and online banking fraud. The service detects mobile malware infection and helps bank …
NetScout simplifies network forensics
NetScout Systems announced nGenius Forensic Intelligence, a new analysis module for the nGenius Service Assurance Solution that enables network operations and information …
Secure, isolate and protect documents
Copiun announced TrustedShare, an enterprise-grade mobile collaboration solution that lets workers securely access and manage documents on mobile devices while delivering …
Oculis Labs proactively protects data on computer displays
Oculis Labs announced PrivateEye Enterprise 4.0, a solution that proactively protects data on computer displays. This solution is built specifically to protect enterprise and …
Security and Privacy for Microsoft Office 2010 Users
Take control and put the built-in security and privacy features in Microsoft Office to work. Whether downloading documents, publishing a presentation, or collaborating online …
Popular Android apps leak private information
AhnLab identified many popular Android apps are asking for excessive permissions to access to the user data. AhnLab analyzed 178 best rated android apps using AhnLab Mobile …
Mobile vulnerabilities increased by 93%
A new Symantec report shows that while the number of vulnerabilities decreased by 20 percent, the number of malicious attacks continued to skyrocket by 81 percent. In …
Mobile security and identity management in the cloud
Executive-level security officers at some of the largest global companies have identified four main concerns for 2012: mobile device security, identity management for cloud …
Entitlement administration and governance
In the identity and access management (IAM) market, we’ve got the terminology all wrong. With bad labels comes misdirected thinking, which ultimately contributes to …
What’s in your daily slice of spam?
Just as the original spam – the tinned meat of 50 years ago – prompted people to wonder just what it contained, so too does the spam of the internet age. …
Featured news
Sponsored
Don't miss
- Australian gold mining company hit with ransomware
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed
- Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)