Please turn on your JavaScript for this page to function normally.
Week in review: DigiNotar breach report, app piracy and email theft via doppelganger domains

Here’s an overview of some of last week’s most interesting news, articles and videos: The Register, The Daily Telegraph, UPS hit by DNS hack Readers of British …

App piracy is hurting Android developers

App downloads in the U.S. are booming to the tune of 40 apps per user per year, according to the Yankee Group. However, not all platforms are participating equally in the …

Wireshark 1.6.2 fixes vulnerabilities

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following vulnerabilities have been fixed: A large …

Email encryption for iPad and iPhone

Echoworx launched an on-the-device email encryption solution for iOS devices. mobilEncrypt ENDPOINT enables, iPhone and iPad users to send and receive secure, encrypted …

Photos: The look and feel of SecurityByte 2011, part 2

Help Net Security attended this India’s largest information security conference in Bangalore – SecurityByte 2011. The first photo gallery is here. A group photo of …

Multi-layer fraud prevention from IronKey

IronKey introduced the next generation of online banking security: an integrated platform of multiple security controls. This approach reduces the risk of online banking fraud …

SplashID Enterprise: Centralized control of password administration

SplashData announced SplashID Enterprise 2.0, featuring updated Windows and Mac OS X clients, new mobile apps and a web-based application that enable enterprise users to …

Log Management 10 comes with compliance enhancements

Ipswitch announced its log management software solution, WhatsUp Log Management 10 which provides out-of-the-box security and compliance for businesses of all sizes. The …

HTML5-based mobile security platform

AirWatch released an HTML5-based MDM platform. By leveraging HTML5, AirWatch’s management console is now even more accessible from any web-connected device, regardless …

Cybercriminals impersonating government agencies

GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …

Drupal Author Pane module security bypass weakness

A weakness has been reported in the Author Pane module for Drupal, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …

How to deal with Internet security threats

How to use the Internet while staying secure has always been a concern for businesses. Over the last couple of years there have been many changes in the Internet threat …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools