Help Net Security
iPhone security showcase: SafeWallet – Password Manager
Mobile software producer SBSH this week released a new version of SafeWallet – Password Manager, an application used for storing private information on your iPhone and …
Rogue software details: Protection Center
Protection Center is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Cyberattacks still top security priority
USIS released a study that identified key issues facing government and industry security personnel and identified a key issue in terms of security vendor structure and …
34 vulnerabilities fixed in June Patch Tuesday
In today’s Patch Tuesday, Microsoft delivers 10 security bulletins that address 34 vulnerabilities affecting Windows, Office and Internet Explorer. Vulnerabilities in …
IBM launches new security solutions
Today at the IBM Innovate 2010 conference in Orlando, IBM introduced new software and services that help organizations build security into the initial design of their …
Source code testing tool AppScan Source Edition released
Building on the momentum of its recent acquisition of security vendor Ounce Labs, IBM introduced AppScan Source Edition, a new addition to its Web application security and …
Uncovering the business benefits behind the new ICO powers
The latest amendment to the Data Protection Act, which came into effect on the 6th of April, means that the Information Commissioner’s Office (ICO) is now able to impose …
IBM delivers secure enterprise mail for the iPad
IBM announced an expansion of IBM Lotus messaging and collaboration software with the delivery of secure enterprise mail for the Apple iPad. IBM Lotus Notes Traveler is no …
1 in 10 IT pros cheat on an IT audit
According to a survey conducted by Tufin Technologies, of 242 IT professionals mainly from organizations employing 1000 to 5000+ employees, 1 in 10 admitted that either they …
Secure login for iPhone apps
DSwiss has launched DoubleSec, a technology that enables automated two-factor authentication on the iPhone for their password and data safe service DataInherit. As well as …
The termination of a spyware business
The Federal Trade Commission has put the brakes on the business practices of an operation that was selling spyware and showing customers how to remotely install it on other …
A preventative, layered approach to head off sophisticated malware threats
It attacked early in the morning without warning, provocation or even a whiff of foreshadowing. Unnoticed, it stealthily wormed through Beefmaster.com’s network …
Featured news
Sponsored
Don't miss
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations
- How to start your cybersecurity career: Expert tips and guidance
- MISP: Open-source threat intelligence and sharing platform