Help Net Security
Top concern? Mobile device vulnerability management
Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …
New SDKs for biometric identification and object recognition
Neurotechnology released new versions of the company’s product line of SDKs for biometric fingerprint, face, iris and voice identification and object recognition. The …
A walk through the expo at InfoSec World 2012
Taking place right now in Orlando, Florida, is InfoSec World Conference & Expo 2012, and Help Net Security is on-site. Here’s a peek at the show floor featuring …
File transfer with end-to-end encryption
Steganos Software announced Elefile – a secure web-based file transfer solution that can be used on any computer or laptop without installing software. Created for …
UK enterprises fear EU Data Protection Act
The proposed EU General Data Protection Regulation could spell trouble to UK businesses, says independent IT integrator SecureData, as its “EU General Data Protection …
Manage Linux and UNIX privileged access
BeyondTrust released PowerBroker Servers Enterprise which allows organizations to seamlessly manage privileged access on Linux and UNIX systems across dynamic physical, …
Cloud computing trends that will affect cloud strategy
Continual monitoring of cloud computing trends, with regular updates to the enterprise’s cloud strategy, will be essential to avoid costly mistakes or miss market …
Deconstructing local and remote file inclusion attack vectors
Imperva released its latest Hacker Intelligence Initiative report exploring how Local and Remote File Inclusion (RFI/LFI) attacks enable hackers to execute malicious code and …
Learning iOS Programming, 2nd Edition
Get a rapid introduction to iPhone, iPad, and iPod touch programming. With this easy-to-follow guide, you’ll learn the steps necessary for developing your first …
Week in review: Massive Zeus C&C servers seizure, Android security, and the challenges of being a CISO
Here’s an overview of some of last week’s most interesting news, reviews, podcasts, interviews and articles: Microsoft disrupts massive cybercrime operation In its …
Six ways to improve SCADA security
Industrial control systems (ICS), distributed control systems (DCS), supervisory control and data acquisition systems (SCADA) have all been around for decades, but thanks to …
Targeted domain controller attacks increase 150%
Bit9 has seen a 150 percent increase in the number of attacks on domain controllers year-over-year. Attackers, largely nation states and cyber criminals, are targeting …
Featured news
Resources
Don't miss
- Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
- China-linked Salt Typhoon hackers attempt to infiltrate European telco
- Most AI privacy research looks the wrong way
- Why ex-military professionals are a good fit for cybersecurity
- Nodepass: Open-source TCP/UDP tunneling solution