Help Net Security
ESET Cybersecurity for Mac
ESET Cybersecurity for Mac is a new security solution that delivers protection against internet security threats without impacting system performance. Users get both Internet …
Cloud computing trust-based security
Trusted Computing Group, which develops industry standards for hardware-based security rooted in trust, announced an effort to extend the concept of trust to cloud-based …
“Here you have” virus authors may be based in Spain
The “Here you have” virus, which first appeared about a month ago, is a worm that has spread widely via email using social engineering (the name of the virus stems …
New data security software from IBM
Today, organizations are struggling to manage a variety of complex data security threats, from misuse by insiders or cyber criminals outside the company. Combined with an …
How CIOs can get things done with their reduced staff
It seems to me that we’re seeing more and more news of late about the lackluster job outlook. Unemployment will continue to be higher than originally forecasted and …
HP to acquire ArcSight
HP and ArcSight have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of …
Browser protection against Web-borne threats
Invincea Browser Protection safeguards enterprise PCs against all types of web-borne threats by moving web browsers—the entry point for most malware—into a virtual …
Vulnerability assessment for databases
Sentrigo announced a fully integrated database activity monitoring and vulnerability assessment solution for enterprises. Hedgehog Enterprise 4.0 provides a complete database …
Week in review: Inside a CERT, hotel systems breach and DHS network security holes
Here’s an overview of some of last week’s most interesting news, articles and videos: Behind the scenes and inside workings of a CERT Brian Honan is the founder …
Rogue employees sell passport data of World Cup fans
Reports are coming in that the Information Commissioner’s Office has started investigating FIFA, the world football governing body, over allegations that details of …
Incentives and challenges for cyber security information sharing
The European Network and Information Security Agency (ENISA), launched a new report on barriers to and incentives for cyber security information sharing. It shows that the …
Be careful what you reveal online
In the video below, Trend Micro CTO Raimund Genes discusses how an attacker can use information from social networks such as LinkedIn and Facebook to hack into a corporate network.
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)