Help Net Security
Week in review: Cybercrime victims, PayPal phishing and Moxie Marlinspike
Here’s an overview of some of last week’s most interesting news and interviews: Top 10 security threats for 2011 Imperva announced their predictions for the top …
Security tips for safer online shopping from mobile devices
47% of employees shopping online will use their company-issued mobile devices: notebook computers, tablets or smart phones. “Digital natives”—ages 18-34, the …
Free tool prevents AutoRun-based malware
Endpoint Protector launched the free AutoRun Disable tool, a solution designed to prevent malware infections spread through USB ports and other computer interfaces and which …
You can do everything right and still be a security attack victim
More organizations now rate information security an upper level priority compared to two years ago, according to a study by CompTIA. But that good news is offset by bad news. …
Most common malware detected on Macs
Recently Sophos launched its free Mac anti-virus for home users which now has 150,000 active users and Sophos has analyzed the most commonly encountered malware that Mac users …
Online backup Mozy 2.0 for Mac released
Mozy 2.0 for Mac is now available. With improved features and a native-Mac experience, it makes it easier and faster for Mac users to run and monitor backups and restores …
Cloud-based crack of SHA-1 passwords is a taste of things to come
Reports that a German hacker has successfully cracked a secure hashing algorithm (SHA-1) password using a pay-as-you-use cloud computing based parallel processing environment …
Vast majority of organizations continue to adopt encryption
For the first time regulatory compliance has surpassed data breach mitigation as the top reason why organizations deploy encryption technologies, according to Ponemon …
Dell releases endpoint encryption solution
Dell today announced Data Protection | Encryption, a flexible, manageable and auditable endpoint encryption solution. The solution is designed to help companies protect …
E-commerce and online gaming phishing attacks surge
Phishing attacks through impersonation of e-commerce sites and gaming companies increased significantly year-over-year around the world in the third quarter of 2010, according …
Google Chrome tops “Dirty Dozen” apps list
Bit9 unveiled its report of the top applications with reported security vulnerabilities in 2010. Google Chrome placed first on the “Dirty Dozen” list, followed by …
Tool finds why specific firewall rules exist in enterprise networks
Athena Security released Firewall Rule Tracker, an asynchronous documentation solution for recording the reason why specific firewall rules exist in enterprise networks. While …
Featured news
Resources
Don't miss
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS