Help Net Security
ISACA issues COBIT process assessment model
Since COBIT was issued 15 years ago, enterprises worldwide have been using it to assess and improve their IT processes. However, until now there has not been a consistent and …
ISO 27001 documentation toolkit
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better. Poorly written documents …
Apple to launch iCloud on October 12
Apple announced that iCloud, a set of free cloud services, will be available on October 12. iCloud stores your music, photos, apps, contacts, calendars, documents and more, …
IBM to acquire Q1 Labs
IBM announced a definitive agreement to acquire security intelligence software provider Q1 Labs. The move aims to accelerate IBM’s efforts to help clients more …
Patching strategies
Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …
Anti-theft protection for Android and Windows devices
Norton Anti-Theft is a new Web-service that allows consumers to remotely lock, locate and recover a lost or stolen Windows based laptop, or Android smartphone or tablet. The …
McAfee to acquire NitroSecurity
McAfee announced a definitive agreement to acquire privately owned NitroSecurity, a provider of SIEM solutions that provide visibility and situational awareness. NitroSecurity …
Critical vulnerabilities in Adobe Photoshop Elements 8
Critical vulnerabilities exist in Adobe Photoshop Elements 8.0 and earlier versions. These two buffer overflow vulnerabilities (CVE-2011-2443) could cause a crash and …
FFmpeg multiple vulnerabilities
Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a Denial of Service and potentially compromise a user’s …
Using online advertising to find out if your data is valuable to a criminal
As it becomes harder for criminals to steal and exploit credit card data, will they give up their carefully crafted tools and stock of zero-day vulnerabilities, or will they …
Webroot SecureAnywhere integrates PC, Android and iOS security
Following Kaspersky One and McAfee All Access, Webroot announced centralized security management for PC, Android and iOS users. Webroot SecureAnywhere enables users to manage …
Suspect cyberbullying? Here’s five tips on what to do
Most parents know that when a bullying incident occurs with their child, they should address it immediately. In the case of cyberbullying, online tools are now available to …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground