Help Net Security
New server line-up based on Intel Xeon Processor E5 family
Hitachi Data Systems will expand its blade and rack server products, based on the new Intel Xeon processor E5-2600 product family introduced by Intel. Hitachi Data Systems …
New mass injection wave of WordPress websites
Websense has detected a new wave of mass-injections of a well-known rogue antivirus campaign. The majority of targets are Web sites hosted by the WordPress content management …
TeamDrive 3.0: Secure cloud file sharing for iOS and Android
TeamDrive released a new client platform that brings security and privacy to the mobile access of cloud data. TeamDrive 3.0 adds secure clients for iOS and Android smart …
Trustwave acquires M86 Security
Trustwave has signed a definitive agreement to acquire M86 Security. The acquisition is expected to close within the next few weeks, and financial terms were not disclosed. …
Removing risk from network and security change management
“There is nothing wrong with change, if it’s in the right direction,” said Winston Churchill. But speak to a hard-pressed CSO or CIO, and they’ll tell …
Big data solution for network traffic
Bivio NetFalcon is the first big data solution for network traffic that performs real-time analytics on long-term, large scale records of network communications. Currently …
Major phishing contributors and enablers
Agari announced the first Annual Sumo Awards to dishonor phishing’s biggest contributors and enablers. The Sumo Awards categories identify why phish emails succeed, …
The decline of trust in social networking platforms
The UK is increasingly well connected, however it is seeing a wave of distrust across all major communications channels (mobile, fixed and social networking) due to fears …
Network-wide anomaly detection and packet forensics
Endace launched OSm 5.0, the latest software release for their range of accurate high speed network monitoring and recording systems. OSm 5.0 offers: Real time indexing of …
Most companies blame employees for data breaches
Employee negligence or maliciousness is the root cause of many data breaches, according to the Ponemon Institute. Over 78 percent of respondents blame employee behaviors, both …
Windows file protection with instant recovery
Condusiv Technologies launched Undelete 10, real time data protection and instant data recovery. The Server, Professional and Client editions of Undelete let you see the …
The CERT Guide to Insider Threats
Since 2001, the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than …
Featured news
Resources
Don't miss
- When confusion becomes a weapon: How cybercriminals exploit economic turmoil
- SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories
- PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
- The legal blind spot of shadow IT
- Email authentication simplified: How PowerDMARC makes DMARC effortless