Help Net Security
How consumers influence data loss and breaches
Cisco announced the results of a survey exploring the security implications of social networking and the use of personal devices in the enterprise. One of the most striking …
Rogue software details: Sysinternals Antivirus
Sysinternals Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
New book: Network Flow Analysis
Network flow analysis is the art of studying high volume network traffic. Rather than capture every single packet, flow analysis allows network administrators to selectively …
WhiteHat Sentinel: SaaS website vulnerability management
WhiteHat Security updated WhiteHat Sentinel, its software-as-a-service (SaaS) website vulnerability management offering, including new User and Role Management options, …
Firefox 3.6.4 fixes several security issues
Mozilla released Firefox 3.6.4 that fixes several security issues as well as stability issues. User tracking across sites using Math.random() Security researcher Amit Klein …
Secure social media management
Cyveillance announced the availability of Secure Social Media Management, which provides organizations with professional review and consultation of social media policies and …
Basic TCP/IP analysis
Hansang Bae leads the Network/Application Performance Engineering Team with direct responsibility for Packet Capture Infrastructure at Citi. In the video below he discusses …
Teens share alarming amounts of personal info online
McAfee released “The Secret Life of Teens,” a survey that surveyed 955 U.S. 13-17 year olds (including 593 teens ages 13-15 and 362 teens aged 16-17) and reveals …
The ultimate Black Hat 2010 party by Qualys
The Qualys party at Black Hat featuring integration partners will take place at the Jet Mirage Nightclub on Wednesday, July 28, 8PM – 2AM. Dance the night away to …
Online family protection for iPhone, iPod touch and iPad
McAfee announced Family Protection iPhone, iPod touch and iPad Edition which provides strong parental controls to keep children safe when they are browsing the Internet on an …
Patch management from the cloud
In today’s IT world, devices are mobile and the Internet has become the corporate network. The result is additional challenges for IT Managers to keep devices patched …
Trustwave acquires Breach Security
Trustwave, a provider of information security and compliance solutions, has acquired Breach Security, a provider of web application firewall technology. The terms of the deal …
Featured news
Sponsored
Don't miss
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations