Help Net Security
NFC-enabled BlackBerry smartphones will “open doors”
HID Global plans to support the company’s iCLASS digital keys and mobile secure identity on NFC-enabled BlackBerry smartphones. The new BlackBerry Bold 9900/9930 and …
Data mapping and masking requirements
A new study of 3,765 publicly disclosed breach incidents shows they resulted in financial losses of more than $156 billion. Published by the Digital Forensics Association, the …
Data loss management SaaS
Co3 Systems announced an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more …
When scammers socialize
A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …
Security case for iPhone 4
BungeeAir is based on a wireless technology that instantly creates a connection between your iPhone and a compact key fob to create a security tether keeping your phone and …
LockDown: USB 3.0 password protected HDD enclosure
Satechi introduced LockDown, a portable external SATA hard drive enclosure that not only keeps your data securely with a encrypted 256-bit AES hardware password protection but …
65% of security pros say SIEM is dead
Two-thirds (65 percent) of senior security professionals at Global 5000 and federal organizations say traditional Security Information and Event Management (SIEM) products no …
phpMyAdmin multiple script insertion vulnerabilities
Multiple vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks, according to Secunia. 1. Certain …
Trend Micro enhances mobile security for Android
Trend Micro announced Trend Micro Mobile Security Personal Edition, a solution designed to protect Android smartphones and tablets. In January 2011, Trend Micro introduced …
Desktop virtualization approaching tipping point
Cost reduction, security, manageability and simplifying the migration to Windows 7 are driving organizations to adopt an aggressive deployment approach when it comes to …
Majority of small businesses unprepared for data disaster
Although small businesses recognize the impact data loss could have on their business, more than half (57 percent) do not have a disaster preparedness plan for business data. …
BackTrack 5 Wireless Penetration Testing Beginner’s Guide
Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of …
Featured news
Resources
Don't miss
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)
- Arvest Bank CISO on building a strong cybersecurity culture in banking
- Review: Inside Cyber Warfare, 3rd Edition