Help Net Security
Duqu not developed by Stuxnet author
The Dell SecureWorks Counter Threat Unit (CTU) research team has been analyzing the Duqu trojan which received a great deal of attention because it is similar to the infamous …
Combating Halloween malware threats
GFI Software released tips for spotting and combating malware attacks and threats in the run up to Halloween. Halloween has now become firmly established as a family event in …
Endpoint Protector 4 released
CoSoSys released a new version of their flagship device control and data loss prevention solution, Endpoint Protector. Offering enhanced protection, increased effectiveness …
National-scale iris and fingerprint identification
Neurotechnology announced MegaMatcher Accelerator 4.0, the latest update of the company’s multi-biometric software and hardware solution for high-volume, high-speed …
Android malware is stealing your data
The second half of 2011 has been an active one for cyber criminals, who have been increasingly looking for chances to set up new scams in the mobile device environment. …
Websense introduces URL categories and social web controls
Websense introduced URL categories and social web controls that enable IT managers to better regulate specific employee actions, reduce exposure to dangerous data-stealing …
Cisco WebEx Player WRF file processing vulnerabilities
Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) player. In some cases, exploitation of the vulnerabilities could allow a remote …
Data breaches cause lasting reputation damage
Reports of data breaches affecting some of today’s largest companies continue to grab the headlines of prominent news outlets nationwide. The damage experienced by a …
Replacement for legacy two-factor authentication
Yubico announced the availability of YubiRADIUS, a free, virtual appliance server that delivers secure remote access, SSL-VPN and VPN connectivity. Built on open source …
Proactive security for private clouds and virtual environments
Cyber-Ark Software extended its auto-discovery capabilities for proactively detecting privileged accounts within virtualized environments. This scalable capability to support …
Manage all mobile devices from one destination
Lookout Mobile Security offers security protection and find-my-phone functionality to all tablet devices, including all Honeycomb and Ice Cream Sandwich Android devices, in …
Citrix delivers apps to any user on any device
Citrix announced the next stage of its strategy for Citrix CloudGateway, the unified service broker that aggregates, controls and delivers Windows, web, SaaS and mobile apps …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act