Help Net Security
Mobile data security doubts
A survey of 104 enterprise mobility professionals showed that more than two thirds of European organizations surveyed are not fully aware what sensitive data is stored within …
Online financial security threats: What can we expect in 2010?
Ori Eisen, Chief Innovation Officer at 41st Parameter, highlights the top five financial security threats which emerged as the biggest money makers for fraudsters and where he …
New risk management ISO standard
The new ISO standard for effective management of risk ISO 31000 provides principles, framework and a process for managing any form of risk in a transparent, systematic and …
Workers stealing data for competitive edge
The recession is creating camaraderie amongst workforces, at the expense of their employers, is the finding of a transatlantic survey. Carried out amongst 600 office workers …
Week in review: Zbot Trojan arrests, 0-day Firefox vulnerabilities and new (IN)SECURE Mag
Here’s an overview of some of last week’s most interesting news, interviews and articles: Most security products fail to perform Nearly 80 percent of security …
Zero-day vulnerabilities in Firefox extensions discovered
One of the reasons behind Firefox’s popularity is the availability of a vast library of extensions. Users use them to modify the browser to their liking and make their …
Cloud computing security benefits, risks and recommendations
How can businesses and governments get the obvious benefits of cloud computing without putting their organization at risk? ENISA (the European Network and Information Security …
World’s first wireless USB external hard drive
Imation announced its Pro WX Wireless USB hard drive that provides 1.5TB of storage. With a fast Wireless USB data transfer rate of up to 15MBs/second, the product can back up …
A look at Securitybyte & OWASP AppSec Asia Conference 2009
India’s largest security conference – Securitybyte & OWASP AppSec Asia Conference 2009 – closed its doors after a very successful four days. Help Net …
Biggest threats to federal systems and critical infrastructure
E-Government initiatives aimed at modernizing federal information systems are fraught with risk, according to a new study sponsored by CA and conducted by the Ponemon …
New books: ModSecurity, Snow Leopard, social Web applications
ModSecurity Handbook features an in-depth coverage of ModSecurity, an open source web application firewall. The main highlights are the following: Step-by-step instructions …
Vulnerability in IBM SolidDB memory caching software
Core Security disclosed a vulnerability that could affect large numbers of organizations using IBM’s SolidDB relational database management system, as well as those …