Help Net Security
Global IT-related risk framework
ISACA released Risk IT, the first global IT-related risk framework to provide a comprehensive view of the business risks associated with IT initiatives. Available as a free …
Top 15 most common security attacks
The latest in the Data Breach Investigations Report series by Verizon Business security experts provide a look at the 15 most common security attacks and how they typically …
Advances in surveillance, more attacks on the horizon
Slashed budgets and reduced staffing numbers delayed many security initiatives in 2009, but the vulnerabilities didn’t retreat and will only intensify in 2010, Unisys …
Microsoft releases six security bulletins
In today’s Patch Tuesday, Microsoft delivers 6 bulletins that fix vulnerabilities targeting Windows, Office and Internet Explorer. Jason Miller, Data and Security Team …
Social media a playground for cybercriminals
Cisco today issued its Annual Security Report for 2009, which highlights the impact of social media, particularly social networking, on network security and explores the …
Conficker worm to become a bigger threat in 2010
Although Microsoft offered a $250,000 reward for information leading to the identities of the cybercriminals behind Conficker, the worm continues to wreak havoc. Since its …
Free Wi-Fi network scanner for Windows
inSSIDer is a free Wi-Fi network scanner for Windows Vista and Windows XP. What’s unique about inSSIDer? Use Windows Vista and Windows XP 64-bit. Uses the Native Wi-Fi …
Corporate information security comes under attack
More than ever, information is regarded by business and corporations as a highly valuable, tangible asset. Unfortunately, this value is also recognized by sophisticated groups …
5 key security trends for the next decade
Imperva predicts five key security trends to watch for over the next ten years. 1. The industrialisation of hacking There is a clear definition of roles within the hacking …
Network security IPS with zero-day malware protection
The McAfee Full Spectrum Network Defense solution delivers day-zero malware detection, network threat behavior analysis, and application-level security. The solution includes …
Seagate introduces Pulsar, its first solid state drive
The Seagate Pulsar is a solid state drive (SSD) designed for enterprise blade and general server applications. It uses single-level cell (SLC) technology, delivers up to 200GB …
WPA cloud cracking service for penetration testers
WPA Cracker is a cloud cracking service for penetration testers and network auditors who need to check the security of WPA-PSK protected wireless networks. WPA-PSK networks …