Help Net Security
Prevent unauthorized electronic fund transfers
Authentify released the ETF Verifier application which enables financial applications and payment platforms to alert legitimate account owners via phone whenever a new payee …
Hacking Web 2.0 JavaScript: Reverse engineering, discovery and revelations
Today, applications are becoming increasingly dependent on the Internet as a foundation platform. As the application domain increases worldwide, the variety of web content …
Rogue software details: Your Protection
Your Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Your …
Data breaches cost Australian companies millions
Australian organizations experience costly data breaches with the average organizational cost of a data breach, including activities intended to prevent a loss of customer or …
First security cart for iPad
With the release of Apple’s iPad, schools and other organizations will be looking at e-readers in new and innovative ways. Datamation Systems introduced the first of a …
Security benchmarks for Windows 7 and Windows Server 2008
The Center for Internet Security (CIS) released its consensus security benchmarks for Windows 7 and Windows Server 2008. The free benchmarks provide prescriptive controls …
Secure communication with RetroShare
RetroShare is an open source cross-platform, private and secure decentralized communication platform. It allows you to securely chat and share files with your friends and …
(IN)SECURE Magazine issue 25 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 25 has been released today. Table of contents The …
First iPad cloud server application
Rackspace Cloud Pro is a free application for the iPad to enable users can turn on backups for a server, create new servers from backups, manage back-up scheduling, re-boot, …
U.S. infrastructure at risk from sophisticated cyber attacks
Nearly three-quarters of federal IT decision-makers who work in national defense and security departments or agencies say the possibility is “high” for a cyber …
Drobo FS: Data storage and protection
Data Robotics introduced Drobo FS which is designed for simple, expandable file sharing. By providing network file sharing capabilities along with automated data protection, …
Closing the last door
There’s always a risk of viruses lurking behind links on a website. Even well-known sites can contain dangerous links, especially those with a high level of public …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits