Help Net Security
Cloud computing traffic to grow 12-fold by 2015
Cisco estimates global cloud computing traffic will grow 12-fold from 130 exabytes to reach a total of 1.6 zettabytes annually by 2015, a 66 percent compound annual growth …
Centralized management of Mac users
Centrify announced a new release of Centrify DirectControl for Mac OS X, a solution for Active Directory-based authentication, single sign-on, smartcard and group policy …
New release of WatchGuard XTM OS
WatchGuard Technologies unveiled their latest security operating system for the XTM line of unified threat management appliances. One of the new features includes the ability …
RIM to manage Android and iOS devices
RIM introduced BlackBerry Mobile Fusion, an enterprise mobility solution that will simplify the management of smartphones and tablets running BlackBerry, Android and iOS …
Cyber security trends for financial services in 2012
Booz Allen Hamilton today cited increased cyber threats to senior executives, the impact of organized crime and mobile device security as among the top 10 financial services …
NetWars to test the skills of infosec professionals
At SANS London 2011, Europe’s largest IT security training event, NetWars will be launched for the first time in the UK. NetWars participants compete in a mock …
Significant drop in FakeAV
The trend in malicious software and attempted cyber crime is up but some of the most popular and visible malware is trending down. According to lab results from Norman, a …
New mobile security challenges
For years, analysts have predicted most Internet users would end up with an all-in-one device that replaces all others. However, as new devices emerge, users are often …
Feds seize 150 domains for selling counterfeit goods
Seizure orders have been executed against 150 domain names of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works. The …
Schneider electric products multiple vulnerabilities
Multiple vulnerabilities have been reported in multiple Schneider Electric products, which can be exploited by malicious people to conduct cross-site scripting attacks, …
Twitter acquires Moxie Marlinspike’s startup
Well-known security researcher and speaker Moxie Marlinspike’s startup Whisper Systems has been acquired by Twitter. The official announcement says: The Whisper Systems …
Week in review: Rogue web browsers, the most vulnerable smartphones, and secure practices for online shopping
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Secure practices for online shopping These simple steps apply to everyone …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does