Help Net Security
Researchers to be rewarded for coordinating software vulnerabilities
Vulnerability researchers are being invited to participate in a new program under which Secunia, a provider of vulnerability intelligence and vulnerability management tools, …
Americans will sue if personal data is compromised
Americans will go to great lengths to avoid identity theft, and many say they would take legal action against government or private organizations that compromise their …
How organizations manage cloud computing security risks
A Ponemon Institut survey of 1,000 IT security practitioners and enterprise compliance officers revealed that less than half of all respondents believe their organizations …
Scan your PC for common vulnerabilities
The Secunia Online Software Inspector, or short OSI, is a fast way to scan your PC for the most common programs and vulnerabilities, thus checking if your PC has a minimum …
Security concerns limit cloud computing use in law firms
Law firm technology managers are tempering their interest in cloud computing with a heightened focus on security, according to an annual survey published in The American …
Fraud prevention and bot protection
Imperva announced the availability of SecureSphere 9.0 and introduced ThreatRadar Fraud Prevention Services and defined a new Web security architecture that not only …
Online social networks: Malware launch pads
With the advent of social networks, the online world has become a virtual society. Social networks serve as seamless communication channels, but at the same time they are …
The rising tide of portable device risks
Responding to research claiming to show that almost a third of executives have rogue mobile devices linked to their organisation’s network, Cryptzone says that this a …
Insecure devices extend shopping risks
Shopping online for the holidays is up, with a 15 point increase in the percentage of Americans who say they will spend more time shopping online than in 2010. But according …
Toolkit cracks encrypted information on iOS 5 devices
ElcomSoft updated the iOS Forensic Toolkit with iOS 5 support for recovering keychain information in iOS 5 devices. Providing near-instant forensic access to encrypted …
Secure replacement for the Certificate Authority System
Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …
Free guide to identity theft prevention
Intersections released the second edition of the Double Trouble ebook, that serves as a guide to identity theft prevention, including real-world scenarios where identity theft …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)