Help Net Security
Hitachi ships 2TB hard drives with bulk data encryption
Hitachi is now shipping their enterprise-class, 7200 RPM 2TB offering, the Ultrastar A7K2000. This hard drive is designed, manufactured and tested to ensure …
Campaign Monitor attacked, accounts compromised
E-mail marketing service Campaign Monitor has been attacked and some accounts have been compromised. The company labeled this as a deliberate, planned and complex intrusion …
Video: Mitigating Web-based malware attacks
Over the past few years, malware spreading primarily by infecting web pages has been a significant emerging trend that has become so significant that the major search engines …
Portable smart card readers from SCM Microsystems
Smart cards are being used worldwide to secure identities in many applications, such as bank payment cards, employee access badges, government identity cards and healthcare …
Arch Linux 2009.08 released
Arch Linux is a lightweight and flexible Linux distribution. The 2009.08 snapshot images are now available. Changes since the 2009.02 release: built from a current snapshot of …
jCryption: Javascript HTML form encryption plugin
jCryption is a javascript HTML form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form. It uses the Multiple-precision and Barrett …
4-drive rack mounted NAS servers from Qnap
Qnap expanded their Turbo NAS lineup with a pair of NAS servers for the corporate and entry-level enterprise market. The new TS-439U-RP and TS-439U-SP models are both 4-drive …
12 tips to protect your identity at school
Schools are traditionally open and unprotected environments. Keeping your personal information secure is a critical responsibility. Losing that information can impact you the …
Protecting enterprises against Web application attacks with IBM
As threats and attacks increasingly target Web applications, many enterprises have been forced to take a reactive approach to security with point products that address only …
Malware beyond Vista and XP
Windows may be ubiquitous, but there’s a thriving variety of alternative operating systems for enterprise and home use. However, the alternatives aren’t as risk …
New book: “Natural Language Processing with Python”
Technologies based on Natural Language Processing, or NLP, are becoming increasingly widespread. In Natural Language Processing with Python, authors Steven Bird, Ewan Klein, …
Twitter security move positive but is it it enough?
Twitter has quietly started checking URLs entered into user messages on its microblogging service. The new level of security might still leave room for improvement on several …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage