Help Net Security
IBM delivers secure enterprise mail for the iPad
IBM announced an expansion of IBM Lotus messaging and collaboration software with the delivery of secure enterprise mail for the Apple iPad. IBM Lotus Notes Traveler is no …
1 in 10 IT pros cheat on an IT audit
According to a survey conducted by Tufin Technologies, of 242 IT professionals mainly from organizations employing 1000 to 5000+ employees, 1 in 10 admitted that either they …
Secure login for iPhone apps
DSwiss has launched DoubleSec, a technology that enables automated two-factor authentication on the iPhone for their password and data safe service DataInherit. As well as …
The termination of a spyware business
The Federal Trade Commission has put the brakes on the business practices of an operation that was selling spyware and showing customers how to remotely install it on other …
A preventative, layered approach to head off sophisticated malware threats
It attacked early in the morning without warning, provocation or even a whiff of foreshadowing. Unnoticed, it stealthily wormed through Beefmaster.com’s network …
Week in review: Flaw-ridden smartphones, Facebook app verification and malware-writing researchers
Here’s an overview of some of last week’s most interesting news and articles: Critical vulnerabilities in Photoshop CS4 Critical vulnerabilities have been …
iPad phishing scheme advertised on Facebook
How would you like to get one of the much-anticipated iPad gizmos in exchange of simply filling up a mere survey? Well, the offer sounds pretty good – in fact, it sounds …
Laptop theft exposes private info of AvMed Health Plans’ customers
Current and former AvMed Health Plans members’ personal information may have been affected by the theft of laptop computers from the company’s offices. In December …
Top 5 FIFA World Cup online risks
Lavasoft warned computer users to be aware of stealthy online traps set by cybercriminals to leverage public interest surrounding the 2010 FIFA World Cup – and issued …
Instant messenger phishing made simple
An Internet application “comes to the rescue” of MSN & YIM users who want to find out if their friends, colleagues or acquaintances have blacklisted them. It …
Rogue software details: Security Master AV
Security Master AV is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Virtualized mobile computing on a secure flash drive
Absolute Identification and Kanguru Solutions released their collaborative product, the RocIT Defender Elite; a secure, pocket-sized virtualized mobile computing platform …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)