Help Net Security
Data center IT departments fear targeted attacks
IT departments are now turning to virtualization, with half of the respondents having either implemented or are planning to deploy private clouds, according to a McAfee study. …
Broadcom releases 40nm Wi-Fi and Bluetooth combo chip
Broadcom released the BCM43142 InConcert combo chip which combines Wi-Fi Direct connectivity with seamless proximity-based pairing, simplifying wireless connectivity in the …
Web Application Attack and Audit Framework 1.0 released
The Web Application Attack and Audit Framework’s (w3af) goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. …
25 years of mobile security
This year marks the 25th anniversary of my first foray into mobile security. True story. Back in the day, the early halcyon days of mobile computing, any device weighing in at …
Week in review: LinkedIn, Hotmail security flaws, Chrome apps with dangerous permissions and the evolution of Mac fake AV
Here’s an overview of some of last week’s most interesting news: 1.5 billion smart credentials to ship The increasing use of smart cards and biometric capture has …
Code in the Cloud: Programming Google AppEngine
Cloud applications are the next big shift in application development: instead of building single-user applications to run on a personal computer, new applications are being …
Cloud identity tools for LinkedIn, Twitter and Microsoft Live
Ping Identity released Cloud Identity Connectors for LinkedIn, Twitter, and Microsoft Live, enabling the enterprise to rely on cloud service providers and social networking …
SCADA SIEM for critical infrastructure protection
AlienVault released its ICS SIEM, a family of purpose-built appliances which provide a platform for security and compliance management across industrial process control …
Spam not the problem it once was
Email spam is still an everyday occurrence, but not the nuisance it once was, according to Avira. Nearly half of all end-users are satisfied with the anti-spam filters on …
How banks use Twitter to combat fraud
With phishing attacks hurting the credibility of email communications, forward thinking banks are turning to social media as the best channel to warn customers of scams and …
The evolution of traditional desktops into personal clouds
As users go virtual in all aspects of their life, the notion of doing all their work on a single traditional desktop in one physical location is rapidly evolving. …
IBM WebSphere Portal XSS vulnerability
A vulnerability has been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. Certain …
Featured news
Sponsored
Don't miss
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management
- Current attacks, targets, and other threat landscape trends