Help Net Security
Wombat enhances PhishPatrol, the anti-phishing email filter
Wombat Security Technologies released a new version of PhishPatrol, an e-mail filter designed to strengthen a business’s current filtering system by catching phishing …
Cellebrite updates forensic extraction device
Cellebrite announced the release of several advancements for the company’s industry leading Universal Forensic Extraction Device (UFED) Series. Cellebrite’s …
Testing program of VPN security for mobile devices
To help millions of enterprise users of smartphones and tablets send and receive data securely, ICSA Labs is offering a testing program for determining whether these devices …
New network storage array from Iomega
Iomega announced the Iomega StorCenter px12-450r Network Storage Array, multi-protocol networked data storage for small and medium business, remote office/branch office …
Top 10 patching hurdles and how to overcome them
Patching is the most effective, efficient and simple method to mitigate malware, worms and viruses. It may not protect against advance attacks that make use of 0-day …
Financial fraud drives most targeted attacks
Check Point announced the results of a new survey revealing 65% of organizations who experienced targeted attacks reported that the hacker’s motivation was driven by …
Tips for a unified records management approach
While an increasing number of companies have one policy for handling paper documents and electronic files, the pervasive growth of new record sources like Twitter, wikis and …
Cloud based SaaS solution for Web and email protection
Total Defense launched Total Defense Cloud Security, an integrated cloud based SaaS solution for Web and email protection which provides organizations with a powerful and …
Panasonic delivers secure video evidence capture
Panasonic introduced its Wearable Video Camera system. The new solution, designed for law enforcement officers in the field, will provide agencies with a comprehensive system …
How digital economy is changing the world
Unzipping the Digital World is a new book by Keith Willetts that captures a lifetime of his experience in the communications and software world and gives an eye-opening view …
Trojan stealing money in German online banking scam
Trusteer came across a complex new criminal scheme involving the Tatanga Trojan that conducts an elaborate Man in the Browser (MitB) attack to bypass SMS based transaction …
BYOD adoption is growing despite security concerns
While organizations are taking considerable steps towards BYOD adoption, network and bandwidth issues remain significant barriers for many. The Aruba survey found that 69 …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility