Help Net Security
Growth in social networking, mobile and infrastructure attacks
IID released its list of the top enterprise security trends for 2011. Some specific areas that will have significant spikes in attacks are social networking, mobile, and …
Juniper Networks acquires Altor Networks
Juniper Networks has acquired Altor Networks, a provider of virtualization security technology that enables organizations to secure the virtualized world. Under the terms of …
How new Facebook user profiles impact privacy
Facebook today announced its New Profile, designed to help users share their experiences, discover common interests and highlight meaningful relationships. The service will be …
Dropbox 1.0.0 RC: Selective sync, bug fixes and improvements
The popular online backup, file sync and sharing service Dropbox released version 1.0.0 RC of their desktop client. Here’s what has been fixed since 0.8.114: Stop the …
Amazon launches new DNS service in the cloud
Amazon Web Services announced Route 53, a DNS web service giving a way to route Internet traffic to web applications by translating human readable names into numeric IP …
Federated voice biometric database to secure and authenticate e-money
Voice Commerce launched KYC Secure, a federated database developed to secure and authenticate a consumer’s identity over their mobile phone. The first regulated mobile …
Week in review: WikiLeaks developments, rich scammers and ATM infections
Here’s an overview of some of last week’s most interesting news, articles and interviews: Release of diplomatic cables reveals Aurora attacks instigator Among the …
Splunk 4.1.6 brings numerous fixes
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …
Twitter accounts spreading malicious code
Cybercriminals are exploiting Twitter to spread malware using festive-themed messages, according to PandaLabs. Using methods akin to black hat SEO techniques, hackers are …
IBM improves software security analysis
IBM announced new software and analysis capabilities that provide a more efficient and accurate way to design and manage secure applications. By consolidating software …
New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
New e-mail security service from Barracuda
Barracuda Networks launched their new Email Security Service, a cloud-based e-mail filtering service which offers: Dual protection points – Onsite and cloud-based threat …
Featured news
Resources
Don't miss
- Smart grids are trying to modernize and attackers are treating it like an invitation
- A day in the life of the internet tells a bigger story
- AI vs. you: Who’s better at permission decisions?
- Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
- Portmaster: Open-source application firewall