Help Net Security
Week in review: Anonymous arrests, Kernel.org and DigiNotar breaches, Google servers as a DDoS tool
Here’s an overview of some of last week’s most interesting news and interviews: Disaster preparedness tips for computers ISACA offers tips to the public and …
SDHC memory card with wireless LAN
Toshiba will launch an SDHC memory card with embedded wireless LAN functionality to meet the SD Memory Card Standard. The new card, “FlashAir”, has an 8GB capacity …
Parallels Mobile app for iOS
The new Parallels Mobile app for iPad, iPhone and iPod touch gives users complete control of their Mac, including OS X Lion and Windows, plus all of their applications, files …
U.S. cities most vulnerable to online threats
Who is most at risk of fraudulent credit card charges, stolen identities, email security breaches or lost personal data? An AVG survey of online and mobile consumer behaviors …
AVG Internet Security 2012 released
AVG announced the availability of AVG Internet Security 2012, the latest edition of its internet security software. In addition to AVG’s multi-layered protection, …
Parallels Desktop 7 for Mac: Faster, new features
Parallels announced the September 6 availability of Parallels Desktop 7 for Mac, that allows you to run Windows and Mac applications side-by-side on a Mac without rebooting. …
IBM acquires i2 to fight crime and security threats
IBM will acquire i2 to accelerate its business analytics initiatives and help clients address crime, fraud and security threats. Financial terms were not disclosed. With more …
Cloud security platform for LAMP stack
Gazzang announced ezNcrypt 2.0, its data security platform, now expanded to provide transparent data encryption (TDE) for the entire LAMP stack, including any data, logs or …
Secunia releases next generation enterprise patch management tool
Secunia released Corporate Software Inspector (CSI) 5.0, an automated patch manager and vulnerability scanner that identifies and remediates all off-the-shelf programs in …
vAuthenticate multiple SQL injection vulnerabilities
Multiple vulnerabilities have been discovered in vAuthenticate, which can be exploited by malicious users and malicious people to conduct SQL injection attacks, according to …
Malicious infections enter 99% of enterprise networks
There is a significant gap in today’s enterprise IT defenses, as advanced malware and targeted attacks are easily evading traditional defenses, such as firewalls, …
Most security pros don’t think a breach will happen to them
New findings from a Tenable Network Security study have uncovered an “It Won’t Happen to Me” mentality amongst security professionals. According to the …
Featured news
Resources
Don't miss
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)
- Arvest Bank CISO on building a strong cybersecurity culture in banking
- Review: Inside Cyber Warfare, 3rd Edition