Please turn on your JavaScript for this page to function normally.
Apple patches critical Java flaw

Apple released a critical update for the Java implementation on Mac OS X, for both Lion and Snow Leopard. This update comes almost two months after the release of the …

SQL injection main database security concern among SMBs

GreenSQL surveyed more than six thousand GreenSQL SMB users – IT administrators, DBAs, data security professionals and consultants – about their most critical …

White box cryptography software protection

SafeNet announced a software protection solution that includes white box cryptography. The SafeNet Sentinel portfolio of software licensing and protection solutions now …

Dropcam HD: Smallest Wi-Fi monitoring camera

The Dropcam HD Wi-Fi video monitoring camera comes with automatic night vision and HD-quality video. You can access the live video stream anytime, anywhere – from a …

Developing Enterprise iOS Applications

If you plan to develop iOS applications in a corporate setting – for internal consumption or for sale to end users – you need to read this book. Veteran developer …

New Ice malware attacking Facebook users

Trusteer researchers have discovered a new configuration of the Ice IX malware that attacks Facebook users after they have logged in to their account and steals credit card …

Sophos acquires DIALOGS to provide mobile device protection

Sophos has entered into a definitive agreement to acquire DIALOGS, a privately-held provider of mobile management solutions, headquartered in Germany. DIALOGS, a mobile device …

First 4TB enterprise hard drive

HGST introduced the first 4TB enterprise-class hard drive family, the Ultrastar 7K4000. As the only 4TB 7,200 RPM enterprise-class drive in the industry, and one with a 2.0 …

ISO 27001 implementation: How to make it easier using ISO 9001

ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …

Top concern? Mobile device vulnerability management

Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …

New SDKs for biometric identification and object recognition

Neurotechnology released new versions of the company’s product line of SDKs for biometric fingerprint, face, iris and voice identification and object recognition. The …

A walk through the expo at InfoSec World 2012

Taking place right now in Orlando, Florida, is InfoSec World Conference & Expo 2012, and Help Net Security is on-site. Here’s a peek at the show floor featuring …

Don't miss

Cybersecurity news