Help Net Security
Social media authenticity, privacy and security
Panda Security is providing guidance on ways to safely and securely integrate social media strategies into an SMB. Panda Security discovered that 78 percent use social …
Going “eye to eye” with network security threats
One of the ironies of our increasingly technology-dependent society is that you need an ever increasing amount of technology to address the failings or risks of the technology …
Failure to invest in secure software a major risk
Failure to take software security seriously is putting organizations, brands and people at risk, according to a report by Creative Intellect Consulting. Key highlights from …
Integrated single sign-on and authentication to cloud and SaaS
SafeNet announced Authentication Manager (SAM) 8.0. The unified enterprise platform combines strong authentication and identity federation to help organizations centrally …
Apple releases developer preview of Mac OS X Lion
Apple released a developer preview of Mac OS X Lion, which takes some of the best ideas from iPad and brings them back to the Mac. The Lion preview is available to Mac …
Malware-driven pervasive memory scraping
Reports are coming in of a new trend in hacking techniques. Known as “pervasive memory scraping,’ the technique relies on the fact that certain areas of Windows …
Spyware compromises 150,000+ Symbian devices
A new variant of spyware “Spy.Felxispy” on Symbian devices causing privacy leakage has recently been captured by the National Computer Virus Emergency Response …
41% of organizations not aware of security risks
41 percent of organizations are not well aware of or protected against IT security risks, according to McAfee. Another 40 percent are not completely confident they can …
BIND Denial of Service vulnerability
A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a Denial of Service, according to Secunia. When an authoritative server …
A single click can open door to cybercrime
Blue Coat Systems unveiled their 2011 security report that examines Web behavior and the malware to which users are most frequently exposed. The report analyzes Web requests …
Social networks: An information security game changer
The Internet has revolutionized business and significantly cut costs in nearly every sector. An in-person bank transaction that costs the enterprise US $15 is only pennies …
Entrust credentialing services smartcards earn Microsoft certification
Entrust credentialing services and related smartcard technology have earned full Microsoft certification for demonstrating hardware compatibility with the company’s line …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations