Help Net Security
The multiple dimensions of corporate espionage
You’ve spent months fixing the red items on an internal audit report and just passed a regulatory exam. You’ve performed a network vulnerability assessment and …
Confidential data exposure in public spaces
While protecting data on computers is top of mind for everyone, most organizations are focused on conventional security technologies such as anti-virus software, personal …
Top software failures of 2011
SQS Software Quality Systems compiled a list of the worst software failures of 2011 that have damaged reputations, impacted negatively on financials and caused stress to …
Holiday travel is risky business for mobile devices
The holidays are a time for tropical getaways, traveling to Grandma’s house to see family and friends and one of the likeliest times a person will lose their mobile …
NETGEAR router with Mac features
NETGEAR announced Wireless Extreme for Mac and PC (WNDRMAC), the company’s first home router to offer Mac-specific capabilities – including native support for …
Managing firewalls in virtual environments
AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by …
The risks of unauthorized access
HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …
PCI DSS is working, but there are challenges to overcome
Recent figures from the UK Cards Association showed that banking industry initiatives, including PCI have been successful in decreasing the volume of card and bank account …
2,000 live typosquatted domains discovered
Customers of major high-street brands such as Argos, Debenhams, and John Lewis are falling victim to cybercriminals that target mistyped web addresses, a technique known as …
Pros losing confidence in hard tokens
Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …
The value of securing Internet enabled devices
From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely to be at the top of many consumers’ Christmas wish lists this year. …
IT departments have easiest access to sensitive data
CEOs of modern companies often lack access to their own sensitive data, according to Venafi. When asked who had the easiest access to their company’s most sensitive …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground