Help Net Security
SSL and the Internet: Where is it all going wrong?
Making sure that a web site is installed, configured and working correctly can be a daunting job for even the most experienced IT security professional. One of the most …
Unified security engine combines 3 Internet security technologies
Commtouch announced its new unified Internet security solution, which brings together messaging security, Web security and antivirus into a single engine. The unified engine …
Malware and virtual patching info added to QualysGuard
Qualys announced that QualysGuard Vulnerability Management (VM) now integrates with Trend Micro Threat Intelligence and Trend Micro Deep Security providing customers with live …
Hardware security modules for cryptographic protection
Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …
Central management of self-encrypting hard drives
Lenovo and WinMagic announced SecureDoc for Lenovo, a full-disk encryption solution for central management of new self-encryption hard drives that meet the Opal standard …
Week in review: HBGary breach, corporate espionage and 2-step authentication by Google
Here’s an overview of some of last week’s most interesting news and articles: Hackers compromised Nasdaq’s network Hackers continue to breach systems of …
What Stuxnet means for the process industry
The Stuxnet and Aurora attacks have shown us that malware development has become a professional job. These threats targeting the process industry were written by highly …
Organizations spend 127 hours per month managing on-site security solutions
Organizations spend an average of 127 hours per month managing on-site security solutions and related problems, according to new research from Webroot. The top time thieves …
SSL certificates for Intel Core vPro processors
Entrust has added SSL certificates for Intel Core vPro processors to its large portfolio of digital certificate offerings. This new capability, core to an identity-based …
Data Breach and Encryption Handbook
Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …
Multiple vulnerabilities in Django
Vulnerabilities have been reported in Django, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion and cross-site …
Van Gogh Museum fan page hit by Facebook scammers
The Facebook page for the Van Gogh Museum in Amsterdam has been targeted by scammers. Messages were posted on the compromised page, including links to a version of the …
Featured news
Resources
Don't miss
- Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857)
- Android financial threats: What businesses need to know to protect themselves and their customers
- Post-quantum cryptography and the future of online safety
- How to manage and protect your biometric data
- UK NCSC offers security guidance for domain and DNS registrars