Help Net Security
Utility bill scam steals personal information
The President of the United States is not going to pay your utility bill. Atmos Energy is warning customers about the latest version of a scam that promises federal stimulus …
8,000+ mobile devices left at top U.S. airports
Credant Technologies announced the results of their survey of top airports in the United States. In the last year, travelers left behind 8,016 mobile devices at seven of the …
Securing apps and avoiding an explosive breach
Recent research from Veracode shows that 84 percent of web applications from American public companies are at risk of being hacked, despite more stringent compliance …
Bootable USB flash drive for secure remote working
Cryptzone released AppGate MOVE (My Own Virtual Environment), a USB flash drive that provides a portable way to access information and applications securely from any computer. …
Half of enterprise networks will be obsolete within five years
Technology trends such as BYOD, video and virtualization are rapidly consuming network capacity and capabilities, and 45 percent of the enterprise networks assessed during …
RIPS: Free PHP security scanner
RIPS finds vulnerabilities in PHP applications using static code analysis. By tokenizing and parsing all source code files RIPS is able to transform PHP source code into a …
Security appliance market continues to grow
According to IDC, both factory revenue and unit shipments grew in the first quarter of 2012 marking the eighth consecutive quarter of year-over-year growth. Worldwide factory …
Samsung samples first 16GB DDR4 modules
Samsung has begun sampling the industry’s first 16GB DDR4, registered dual inline memory modules (RDIMMs), designed for use in enterprise server systems. Using …
Mastering Windows Network Forensics and Investigation
Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book …
Firewall management, IPv6 and you
Created 30 years ago, IPv4 has a 32-bit addressing scheme and can support approximately 4.3 billion devices connected directly to the Internet. Well aware that IPv4 addresses …
ISACA issues COBIT 5 for Information Security
ISACA released COBIT 5 for Information Security, which builds on the COBIT 5 framework to provide practical guidance for those interested in security at all levels of an …
Microsoft SQL Server 2012 T-SQL Fundamentals
Get started with the fundamentals of Transact-SQL and learn how to write efficient and powerful database queries. With this hands-on guide, you’ll gain a solid …
Featured news
Resources
Don't miss
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed
- Should AI access be treated as a civil right across generations?
- What cybersecurity leaders are reading to stay ahead