Please turn on your JavaScript for this page to function normally.
20 ways to lose your database

Arguably an organizations’ most vital asset is its databases, often containing sensitive financial information, customer and employee data and intellectual property. …

The top benefits of virtualization

According to a CDW-G report, 77 percent of agencies are implementing at least one form of virtualization, and of those, 89 percent are benefiting from the technology. Benefits …

Win a copy of “Cyber War” or “Hacking: The Next Generation”

Subscribe to the Help Net Security newsletter and win one of these books: If you win, we will e-mail you on July 19. Our weekly newsletter is packed with information security …

Metasploit training program launched

Rapid7 and SANS will provide comprehensive training to the growing global community of Metasploit Framework users. The Metasploit Framework is an open source project managed …

SSL Labs 1.0.63 comes with improvements

The latest revision of the SSL Labs assessment engine adds several improvements in the area of certificate chains. The engine will now try to download missing intermediate …

Prevent web application abuse

Mykonos Software announced a new release of the Mykonos Security Appliance, aimed at preventing Web application abuse. Targeted at organizations with significant web …

Rogue software details: AV Security Suite

AV Security Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Imperva mitigates insider threats

Imperva announced a File Security product line. SecureSphere File Firewall prevents unauthorized access to unstructured data residing on file servers, network attached storage …

Microsoft closes five vulnerabilities in Windows and Office

In today’s Patch Tuesday, Microsoft delivers four bulletins that close five vulnerabilities in Windows and Office. Wolfgang Kandek, Qualys CTO, comments: …

Cybercriminals increase effectiveness with multi-stage attacks

Cybercriminals have been increasing the effectiveness of their individual outreach by creating multi-stage, also known as blended, attacks, which combine messaging and Web …

GFI acquires Sunbelt Software

GFI Software has acquired Sunbelt Software and specifically its VIPRE product suite. Terms of the transaction were not disclosed. The acquisition will allow GFI to merge VIPRE …

Integrated solution for software integrity

Coverity and Armorize Technologies announced the integration of Coverity Static Analysis and Armorize CodeSecure. This partnership is intended to deliver a combined solution …

Don't miss

Cybersecurity news