Help Net Security
Apple patches critical Java flaw
Apple released a critical update for the Java implementation on Mac OS X, for both Lion and Snow Leopard. This update comes almost two months after the release of the …
SQL injection main database security concern among SMBs
GreenSQL surveyed more than six thousand GreenSQL SMB users – IT administrators, DBAs, data security professionals and consultants – about their most critical …
White box cryptography software protection
SafeNet announced a software protection solution that includes white box cryptography. The SafeNet Sentinel portfolio of software licensing and protection solutions now …
Dropcam HD: Smallest Wi-Fi monitoring camera
The Dropcam HD Wi-Fi video monitoring camera comes with automatic night vision and HD-quality video. You can access the live video stream anytime, anywhere – from a …
Developing Enterprise iOS Applications
If you plan to develop iOS applications in a corporate setting – for internal consumption or for sale to end users – you need to read this book. Veteran developer …
New Ice malware attacking Facebook users
Trusteer researchers have discovered a new configuration of the Ice IX malware that attacks Facebook users after they have logged in to their account and steals credit card …
Sophos acquires DIALOGS to provide mobile device protection
Sophos has entered into a definitive agreement to acquire DIALOGS, a privately-held provider of mobile management solutions, headquartered in Germany. DIALOGS, a mobile device …
First 4TB enterprise hard drive
HGST introduced the first 4TB enterprise-class hard drive family, the Ultrastar 7K4000. As the only 4TB 7,200 RPM enterprise-class drive in the industry, and one with a 2.0 …
ISO 27001 implementation: How to make it easier using ISO 9001
ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …
Top concern? Mobile device vulnerability management
Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …
New SDKs for biometric identification and object recognition
Neurotechnology released new versions of the company’s product line of SDKs for biometric fingerprint, face, iris and voice identification and object recognition. The …
A walk through the expo at InfoSec World 2012
Taking place right now in Orlando, Florida, is InfoSec World Conference & Expo 2012, and Help Net Security is on-site. Here’s a peek at the show floor featuring …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility