Help Net Security
Cisco to acquire newScale
Cisco today announced its intent to acquire privately-held newScale, a provider of software that delivers a service catalog and self-service portal for IT organizations to …
The most challenging compliance regulation? HIPAA
From an IT standpoint, the Health Insurance Portability and Accountability Act (HIPAA) is the most challenging regulation to businesses today, according to Ipswitch. HIPAA, …
The smartphone: A real bug in your bed
The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …
VPN client suite for Mac OS X
NCP engineering released its centrally managed IPsec VPN client for Mac OS X 10.5 (Intel) and 10.6. Mobile employees using Mac OS X are now able to access the company network …
Spotify has been displaying malicious ads
Streaming music service Spotify has been displaying malicious ads to users of their Free version. The ads lead to websites that used the Blackhole Exploit Kit to infect users …
Intellectual capital is the new cybercrime currency
Cybercriminals understand there is greater value in selling a corporations’ proprietary information and trade secrets which have little to no protection making …
Protect the privacy of your Android phone
Privacy Blocker is an Android application that stops other installed applications from gathering your personal information. The software basically pinpoints the type of data …
Most organizations can’t access critical security data
Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …
Metrics and measurements in network and service resilience
Business and governments are all reliant on secure networks, but how do you measure the resilience of these networks? The European Network and Information Security Agency …
New Unified Threat Management gateway from Netgear
Netgear introduced the ProSecure UTM150 – a Unified Threat Management (UTM) gateway for businesses with around 150 users. The new UTM150 delivers enhanced graphical …
Week in review: SCADA attack code, Play.com breach and Comodo’s rogue SSL certificates
Here’s an overview of some of last week’s most interesting news, articles, interviews, videos and podcasts: Google blames China for Gmail service disruptions It …
IPv6 reputation is doable
The Internet has grown beyond what anybody involved in its early development could have imagined. Who would have thought that a network developed in the 1970s for government …
Featured news
Resources
Don't miss
- SafeLine Bot Management: Self-hosted alternative to Cloudflare
- Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054)
- Apple plugs zero-day holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201)
- When AI agents go rogue, the fallout hits the enterprise
- Inside PlugValley: How this AI vishing-as-a-service group operates