Help Net Security
Cyber security exercises prepare you to deal with security threats
Cyber security attacks against public and private information technology and networks are escalating in occurrence and complexity. Those intent on causing harm never cease in …
Gemalto acquires Trusted Logic
Gemalto announced that it has completed the acquisition of Trusted Logic from its founders and other shareholders. Gemalto, which already held 32% of the shares, aims with …
Microsoft releases five security bulletins for Windows
It’s time for a summer Patch Tuesday and Microsoft delivers a variety of patches that fix vulnerabilities targeting Windows. Vulnerability in JScript scripting engine …
EasyPeasy 1.5 released
EasyPeasy is an operating system optimized for netbooks. Version 1.5 is built off Ubuntu 9.04. New in this release: Linux kernel 2.6.30 optimized for netbooks with faster …
Gartner: Security software and services budgets to increase in 2010
Security software and services spending will outpace other IT spending areas in 2010, according to a new survey by Gartner. Security software budgets are expected to grow by …
Host-based IDS OSSEC 2.2 released
The OSSEC team is pleased to announce the general availability of OSSEC version 2.2. This new version is the first one with support for centralized configurations and realtime …
WordPress worm: upgrading is vital
WordPress warns that a worm has been making the rounds of the old versions of its platform. Blog writers who didn’t get around to upgrading their versions remained …
SaaS vulnerability scanning for internal networks
Comodo introduces vulnerability scanning for internal networks in the cloud with the newest release of its HackerGuardian. Previously, internal network scans required …
F-Secure Internet Security 2010 pre-installed on Nokia Booklet 3G
F-Secure and Nokia are extending their collaboration to include Internet security on computers. Owners of the Nokia Booklet 3G mini-laptop get a free 30-day trial version of …
The path to comprehensive ID management
There have been many changes since enterprises first looked at implementing smart card-based common access card programs in the 1990s. Although some large corporations …
Encrypted mobile phone calls from anywhere
Cellcrypt Mobile is now available over Inmarsat‘s broadband satellite services, enabling encrypted voice calls to be made on popular smartphones from anywhere for the …
OpenLR: Opens source dynamic location referencing technology
TomTom developed a dynamic location referencing technology as an open standard for the navigation, mapping and ITS Industry, called OpenLR. OpenLR has been designed for …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics