Help Net Security
Piracy and counterfeit goods websites generate 53 billion visits per year
A sampling of only 22 brands revealed that websites offering pirated digital content and counterfeit goods generate more than 53 billion visits per year, according to a study …
Multi-biometric SDK MegaMatcher 4.0 released
Neurotechnology released MegaMatcher 4.0, a multi-biometric software development kit (SDK) that integrates fingerprint, iris, facial and palmprint biometrics in a single, …
USA number one as spam becomes more malicious
Sophos has published the latest ‘Dirty Dozen’ of spam relaying countries, covering the fourth quarter of 2010. The United States increased its lead at the top …
24% of clicks generated by a Facebook scam came from mobile platforms
Malware that targets social networks such as Facebook is platform-independent and is as widely spread as malware that targets PCs, warned BitDefender. According to Google …
Vodafone’s data security dirty laundry aired in public
Reports that Vodafone’s Australian operation is in the firing line of the country’s Privacy Commissioner, following the apparent placing of billing and call …
Database activity monitoring and vulnerability assessment
Sentrigo released Hedgehog Enterprise 4.1, a fully integrated database activity monitoring and vulnerability assessment solution. Hedgehog DBscanner now conducts checks for …
Secure network access for iPad, iPhone and iPod touch
F5 Networks announced that its BIG-IP Edge Client app and BIG-IP Edge Portal app are now available at the App Store. These apps provide iPad, iPhone, and iPod touch users with …
Managed Wi-Fi access and PCI scanning in a single device
AirTight Networks launched Secure Wi-Fi – a suite of managed services which adds Wi-Fi access. With today’s launch, the company offers hosted, cloud-based, secure …
NSA building one million square-foot data center
The National Security Agency and the U.S. Army Corps of Engineers broke ground on a $1.2 billion data center at Camp W.G. Williams National Guard Post. The massive, one …
Free monitoring tool for Hyper-V environments
HyperV_Mon monitors physical, logical, and virtual performance information that is available when running virtual machines under Microsoft Hyper-V. The graphical display is …
Tuesday is the most active day for threats
The most active day for threat-related traffic worldwide is Tuesday, with Monday a close second, according to a report by SonicWALL. This pattern holds true for the U.S., …
Mono ASP.NET source code disclosure vulnerability
Mono is an open source, cross-platform, implementation of C# and the CLR that is binary compatible with Microsoft.NET. A vulnerability has been reported in Mono, which can be …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations