Help Net Security
Packet Guide to Routing and Switching
Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. …
Week in review: Multifunction printer hacking, new protection mechanisms for IE 10 and most notorious Android malware
Here’s an overview of some of last week’s most interesting news, podcasts, articles and reviews: Multifunction printer hacking In this podcast, Deral Heiland talks …
Most notorious Android malware
Total Defense announced the findings of its 2011 Internet Security Threat Intelligence Report, which indicates Android’s rise in market share was only surpassed by the …
Are mobile password apps pointless?
ElcomSoft analyzed 17 popular password management apps available for Apple iOS and BlackBerry platforms, including free and commercially available tools, and discovered that …
Middle East plans to build a cyber-stronghold
The risks and consequences of cyber-attacks are increasing exponentially each day. The computers that control most of the world’s oil and gas production and distribution …
Wi-Fi hotspot testing simplified
Wi-Fi Hotspots are hot. From coffee shops, to airports, to sport venues, to gas stations and Laundromats, they’re springing up everywhere and are projected to grow 350 …
PayPal unveils new global mobile payments solution
PayPal announced PayPal Here, the first global mobile payments solution that allows small businesses to accept almost any form of payment. The service includes a free app and …
SSH user key management solution
SSH Communications Security unveiled today the first new extension of its SSH Information Integrity Platform, SSH User Key Management. The module will serve to provide …
Turn iOS devices into secure wireless flash drives
AirDisk Pro turns any iOS device into a personal and secure wireless drive, allowing users to save, manage, edit and view files on iPhone, iPad and iPod Touch devices. …
Profile Analyzer: Protect websites from cyber attacks
Silver Tail Systems announced Profile Analyzer, which provides real-time analysis of both individual user behavior and crowd behavior on websites to identify malicious …
Key management device for payment security
Thales announced its Key Management Device (KMD) for payment hardware security modules (HSMs) to provide high assurance security for the critical task of forming cryptographic …
Malware sophistication worries IT leaders
More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous