Help Net Security
Microsoft releases two security bulletins
The Microsoft Security Bulletin Summary for September 2012 includes just two bulletins, both of which address vulnerabilities rated “important.” The first, …
39% of IT staff can get unauthorized access to sensitive information
IT professionals are allowed to roam around corporate networks unchecked, according to a survey of more than 450 IT professionals by Lieberman Software. It found that 39% of …
Jump in mobile app and banking scams
In August, GFI threat researchers identified a number of high-profile fake mobile application scams, along with a spike in email scams targeting UK banking and government …
HP introduces intelligent security solutions
HP announced additions to its security solutions portfolio that enable enterprises to assess, transform, optimize and manage their security environments. Cloud, mobility and …
Social networking protection from Trend Micro
Trend Micro released Trend Micro Titanium Internet Security 2013, a new family of security software that promises to consumers “Protection Made Easy” combining …
PostgreSQL 9.2 improves performance and scalability
With the addition of linear scalability to 64 cores, index-only scans and reductions in CPU power consumption, PostgreSQL 9.2 has improved scalability and developer …
Hosted mobile device management solution from Sophos
Sophos announced the hosted version of its mobile device management (MDM) solution, Sophos Mobile Control, which allows businesses to deploy an MDM solution without any …
D-Link releases outdoor cameras with cloud services
D-Link introduced the new D-Link DCS-7010L high-definition outdoor mini bullet camera with integrated cloud services support and the D-Link DCS-7513 two-megapixel outdoor …
Windows 8 Secrets
Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally …
New program offers pathway into cyber security field
(ISC)2 launched the (ISC)2 Young Professionals, a new group designed to help cultivate the information security workforce of the future. The pilot stage of the program will …
Who is the most dangerous cyber celebrity?
Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …
Mobile malware has become a profitable industry
Lookout released its State of Mobile Security Report 2012 which explains the issues that individuals faced on mobile devices this year and explores the prominent trends in …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC