Help Net Security
Less than half of cloud services are vetted for security
More than half of U.S. organizations are adopting cloud services, but only 47 percent of respondents believe that cloud services are evaluated for security prior to …
Stealth HD Series: USB portable security devices
MXI Security introduced the new Stealth HD Series of encrypted USB hard drives. Replacing the well-known Outbacker MXP Series, the Stealth HD Series is powered by MXI …
Network admins worry about employee use of social media
According to findings a survey of 353 network administrators by Amplitude Research, four-in-ten (40%) were either “extremely concerned” (18%) or “moderately …
ENISA maps key online security actors and strategies across Europe
A study by the European Network and Information Security Agency (ENISA) provides a 750 pages-plus overview of the status of network and information security (NIS) in 30 …
Rogue software details: Data Protection
Data Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Data …
Rootkit-based Skype worm opens backdoors
While both Yahoo! Messenger and MSN Messenger have been massively exploited by IM worms, Skype users have been less exposed to this type of e-threat. It’s true that …
Microsoft delivers two critical updates
In today’s Patch Tuesday, Microsoft delivers two security bulletins that address vulnerabilities affecting Windows, Office and Visual Basic for Applications. …
Lessons learned and ongoing risks at third anniversary of T.J. Maxx breach
As the third anniversary of the infamous TJX data breach approaches, Slavik Markovich, CTO of Sentrigo, shares his thoughts on how data security has improved, and also …
Anti-Phishing Phyllis training game
Wombat Security Technologies announced the release of Anti-Phishing Phyllis, a training game to teach employees and customers how to spot fraudulent emails. In this training …
Xplico: Network forensic analysis tool
Xplico is an open source Network Forensic Analysis Tool. Its goal is to extract from an Internet traffic capture the applications data contained. From a pcap file Xplico …
New model for cloud-based security from Verizon Business
Verizon Business unveiled a new global, cloud-based SaaS portfolio that offers enterprises the ability to add security services and avoid purchasing expensive equipment. …
Schedule and modify tasks for Windows servers and workstations
Task Scheduler Pro from Lieberman Software now supports all major platforms in the Windows enterprise including Windows 7, Windows Server 2008 R2, Windows Server 2008 and …
Featured news
Resources
Don't miss
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible