Help Net Security
Big gaps in backup plans
Small businesses are using a variety of technologies to back up data including some antiquated methods that leave the backup process incomplete and susceptible to information …
LogRhythm and Solera Networks announce a technology partnership
LogRhythm and Solera Networks announced a technology partnership to provide customers with network visibility, security and situational awareness by combining …
New online banking fraud schemes target mobile users
Trusteer uncovered two online banking fraud schemes designed to defeat one time password (OTP) authorization systems used by many banks. Unlike a previous attack Trusteer …
iOS 5 Programming Cookbook
Now you can overcome the vexing, real-life issues you confront when creating apps for the iPhone, iPad, or iPod Touch. By making use of more than 100 new recipes in this …
Higher education breaches significantly down
In a year highlighted by the biggest data security breaches on record, the higher education vertical appears to have had a reprieve relative to prior years in terms of overall …
SafeNet acquires Cryptocard
SafeNet has acquired Cryptocard, a provider of cloud based authentication solutions. Financial terms were not disclosed. By combining SafeNet’s authentication solutions …
DirectPass: Password management and login convenience
Trend Micro announced DirectPass, a password management solution. Designed to organize and manage passwords, DirectPass provides consumers with a way to manage their online …
Carnegie Mellon researchers unveil iOS and Android security app
Carnegie Mellon University CyLab researchers have developed a new smartphone app that leverages the growing proliferation of these devices to establish a secure basis for …
New IEEE standards for the smart grid
IEEE announced five new standards, as well as a modified standards-development project, that are all intended to aid the efficient rollout of the smart grid worldwide. The new …
CompTIA Network+ Lab Manual
Think of the most common and challenging tasks that network administrators face, then read this book and find out how to perform those tasks, step by step. CompTIA Network + …
Week in review: LulzSec hackers arrested, inadequate Android AV solutions, and the GitHub hack
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Pinterest users targeted with scams Pinterest, the pinboard-styled social …
Users hammered by fake AV resurgence
GFI Software released its VIPRE Report for February 2012, a collection of the 10 most prevalent threat detections encountered during the month. Most notably, GFI Labs has been …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility