Help Net Security
Cisco WebEx Player WRF file processing vulnerabilities
Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) player. In some cases, exploitation of the vulnerabilities could allow a remote …
Data breaches cause lasting reputation damage
Reports of data breaches affecting some of today’s largest companies continue to grab the headlines of prominent news outlets nationwide. The damage experienced by a …
Replacement for legacy two-factor authentication
Yubico announced the availability of YubiRADIUS, a free, virtual appliance server that delivers secure remote access, SSL-VPN and VPN connectivity. Built on open source …
Proactive security for private clouds and virtual environments
Cyber-Ark Software extended its auto-discovery capabilities for proactively detecting privileged accounts within virtualized environments. This scalable capability to support …
Manage all mobile devices from one destination
Lookout Mobile Security offers security protection and find-my-phone functionality to all tablet devices, including all Honeycomb and Ice Cream Sandwich Android devices, in …
Citrix delivers apps to any user on any device
Citrix announced the next stage of its strategy for Citrix CloudGateway, the unified service broker that aggregates, controls and delivers Windows, web, SaaS and mobile apps …
A tech theory coming of age
As early as 2005, many industry analysts predicted “consumerization” — the introduction of consumer-owned/purchased devices into enterprise and business …
Web application security vulnerabilities and strategies
The use of web applications has soared recently, due to the significant value they can add to enterprises by providing innovative ways to interact with customers. However, so …
First public cloud to support Solaris
CloudSigma announced the addition of Solaris to its cloud platform, making it the first major public cloud to support Solaris. Solaris supports more than 11,000 third-party …
1000 professionals are now CSSLP certified
(ISC)2 announced that over 1,000 professionals from 44 countries now hold its Certified Secure Software Lifecycle Professionals (CSSLP) certification. Application …
Cloud computing disaster recovery
Online Tech announced a disaster recovery solution for cloud computing. DR Now! replicates the entire hosted cloud including servers, software, network and security to an …
Secure file sharing app for iOS
Accellion Mobile Apps for iPad and iPhone with iOS 5 support provide secure mobile file sharing capabilities are currently available from the App Store. The Accellion Mobile …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)