Help Net Security
Hacktivists are “villains”, say IT security pros
The majority of IT security professionals have – unsurprisingly – a negative opinion of “hacktivists”, say the results of a survey of 211 attendees at …
Amazon extends cloud access, enables “identity federation” for accessing it
Amazon Web Services has extended Amazon Virtual Private Cloud (Amazon VPC) to all AWS Regions, allowing enterprises to launch their Amazon VPC environments in the US East and …
Scanning thousands of Web apps in days, not months
Faced with the reality that exploiting a single SQL Injection vulnerability or cross-site scripting (XSS) error in any web application could take down an organization’s …
Penetration testing for mobile phones
Core Security announced the Core Impact Pro v12 penetration testing software, a commercial-grade solution that pinpoints security exposures in Android, BlackBerry and iPhone …
Free password reset self service solution for SMBs
Nervepoint Technologies announces the launch of Access Manager Self Service, a free Password Self Service solution for SMBs. With almost zero-configuration, the service …
Web application security on a new level
Qualys announced QualysGuard WAS 2.0, enabling organizations to leverage the power and scalability of the cloud to discover, catalogue and scan large numbers of web …
Automated malware analysis for businesses
GFI released GFI SandBox 3.4 (formerly CWSandBox), the latest update to their malware analysis tool that helps security professionals assess suspected files and URLs for …
Virtualized scanners and report customization for security assessment
Qualys announced a new edition of the QualysGuard Consultant service, featuring virtualized scanner appliances (vScanners) and a report customization module. The new edition …
Context-based Web UI ushers in Qualys’ new SaaS platform
Qualys showcased its new UI for the QualysGuard IT Security and Compliance SaaS Suite, now available in beta for all customers. The new context-based UI features interactive …
Microsoft offers $250,000 prize for innovative security technology
Microsoft may not believe in bug bounties, but it’s not adverse to paying for knowledge when it comes to ingenious defensive solutions. The company’s Trustworthy …
An epidemic of security worst practices
The majority of organizations fail to adhere to simple data protection standards and, in many cases, are fully unaware of what security practices are currently in place, …
Mobile threats soared in past six months
Mobile malware has increased significantly, and Android users are two-and-a-half times as likely to encounter malware today than just six months ago, says Lookout. Based on …
Featured news
Sponsored
Don't miss
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management
- Current attacks, targets, and other threat landscape trends