Help Net Security
New storage system for field forensic investigators
Guidance Software announced a new compact, easily transportable storage system that gives forensic investigators the storage capacity they need to handle large cases in the …
Cisco to acquire Pari Networks
Cisco announced its intent to acquire privately-held Pari Networks, a provider of network configuration and change management (NCCM) and compliance management solutions that …
Conficker: Lessons learnt
The Conficker worm is the largest computer worm infection with more than seven million government, business and home computers in over 200 countries now under its control. In …
Mark Zuckerberg’s Facebook page hacked
An unknown hacker broke into the 26-year-old internet celebrity’s Facebook account and posted a bizarre message calling upon the firm to adopt a social cause: “Let …
Riskiest social media applications
The fastest growing threat to corporate networks is web-based social media applications, according to WatchGuard security researchers. These applications can seriously …
Hedge funds unprepared for cyber attack
With details trickling in about how the sophisticated Stuxnet computer worm derailed years of work on Iran’s nuclear program, many seasoned observers are left to wonder …
Automated backup service for Google Apps
Backupify announced One-Click Restore for critical data stored in Gmail, Google Docs, Google Calendar and Google Contacts accounts. Over three million businesses and …
Finalists announced for the “Most Innovative Company at RSA Conference 2011” contest
RSA Conference announced the top 10 finalists for its “Most Innovative Company at RSA Conference 2011” contest, part of its half-day Innovation Sandbox program. …
A good decade for cybercrime
For Internet users, it has been a decade of exciting online advances that allow people to communicate, share information and conduct business in ways that were never before …
PayPal most phished, Facebook most blocked
OpenDNS released statistics about which websites were commonly blocked — and which websites users were frequently given access to — in 2010. The report additionally details …
Decisive factors for designing resilient networks
The resilience of data networks is vital for the economy and society. Yet, abnormal but legitimate traffic, malicious attacks, accidents or human mistakes, and technical …
Man tries to work for CIA in order to spy for China
Glenn Duffie Shriver from Michigan was sentenced to 48 months in prison for conspiring to provide national defense information to intelligence officers of the People’s …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations