Help Net Security
A tech theory coming of age
As early as 2005, many industry analysts predicted “consumerization” — the introduction of consumer-owned/purchased devices into enterprise and business …
Web application security vulnerabilities and strategies
The use of web applications has soared recently, due to the significant value they can add to enterprises by providing innovative ways to interact with customers. However, so …
First public cloud to support Solaris
CloudSigma announced the addition of Solaris to its cloud platform, making it the first major public cloud to support Solaris. Solaris supports more than 11,000 third-party …
1000 professionals are now CSSLP certified
(ISC)2 announced that over 1,000 professionals from 44 countries now hold its Certified Secure Software Lifecycle Professionals (CSSLP) certification. Application …
Cloud computing disaster recovery
Online Tech announced a disaster recovery solution for cloud computing. DR Now! replicates the entire hosted cloud including servers, software, network and security to an …
Secure file sharing app for iOS
Accellion Mobile Apps for iPad and iPhone with iOS 5 support provide secure mobile file sharing capabilities are currently available from the App Store. The Accellion Mobile …
GFI Software reaches into the cloud with Monitis acquisition
GFI Software has acquired Monitis, a provider of cloud-based network and systems monitoring solutions. This acquisition further strengthens GFI’s ability to provide …
Practical tips for identity theft prevention
A recent Javelin Strategy & Research study found that fraud suffered by Small Business Owners (SMBO) totaled $8 billion. Banks, merchants and other providers absorbed at …
New mass SQL injection attack making rounds
Again a mass SQL injection attack is making its rounds on the web – this one called jjghui referring to the website it redirects traffic to. As Armorize reported, this …
Duqu: Another “most advanced” piece of malware
Rootkit.Duqu.A is the current star in the world of malware but, as history shows, that fame will be short-lived. Just like fashion models, modern malware has a lifespan in the …
Consumers increasingly savvy about being online
Online consumers are increasingly savvy about being online, but many still do not employ all of the right tools to protect their privacy according to Anonymizer. While nearly …
Bug allows remote code execution in Chrome
In September ACROS Security notified Google about a peculiar behavior of the Chrome browser that can be exploited for execution of remote code outside Chrome sandbox under …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act