Help Net Security
First free credit monitoring service
Credit Karma became the first company to offer free credit monitoring to all U.S. consumers. The new feature will monitor a consumer’s credit file on a daily basis and …
Security solution on Amazon Web Services
Check Point announced its security gateways are now available to customers through Amazon Web Services (AWS), enabling organizations to extend their security to the cloud with …
Open source computing platform Apache Hadoop 1.0 released
The Apache Software Foundation announced Apache Hadoop 1.0, the open source software framework for scalable, distributed computing. The project’s latest release marks a …
Online scam susceptibility of American consumers
PC Tools, in collaboration with the Ponemon Institute, announced the findings of its online scam susceptibility study of 1,858 American consumers. The results of the survey …
Risk Control 6.0 released
Skybox Security announced Risk Control 6.0, featuring enhancements that help understand cyber security situations and act quickly to minimize risks that can lead to …
SpyEye Trojan post transaction fraud schemes attack banks
Many of us tend to spend a little more than we intend during the holiday season and, with all the transactions hitting our accounts, it can be hard to keep track. During the …
Israeli credit card hack creates more opportunities
In a recent data breach incident, a Saudi hacker defaced a prominent sports news web site in Israel and linked its front page to a file exposing the details of many credit …
Teach Yourself TCP/IP in 24 Hours
In just 24 sessions of one hour or less, you’ll discover how to implement, monitor, and manage a TCP/IP network – even the latest cloud-based and IPv6 networks. …
HID Global acquires EasyLobby
HID Global has acquired EasyLobby, a provider of visitor management solutions. The company’s product suite provides visitor registration, tracking, reporting, badge …
Nmap introduces 51 new scripts
Nmap is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network …
Securing Android for the enterprise
The numbers speak for themselves – Android’s share of the worldwide smartphone market is 52.5 percent, more than double compared to a year ago, according to recent …
Tips to manage top IT trends
ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)