Help Net Security
Mobile security encryption solutions from PGP
PGP announced two new mobile security encryption solutions, PGP Portable and PGP Mobile 9.10, designed to address the challenges facing organizations that share portable data …
WordPress 2.8.2 fixes XSS vulnerability
WordPress 2.8.2 fixes an XSS vulnerability. Comment author URLs were not fully sanitized when displayed in the admin. This could be exploited to redirect you away from the …
Device control and endpoint security for Mac users
CoSoSys released My Endpoint Protector for Mac. This device control and data loss prevention service for Mac users and network administrators offers the ability to proactively …
New book: “Automating System Administration with Perl”
If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System …
Nmap 5.00 released
Nmap (“Network Mapper”) is a free and open source utility for network exploration or security auditing. Version 5.00 is the first major release since 4.50 in 2007, …
New hardware security module from Thales
Thales announced Thales nShield Connect 6000, a fast network-attached hardware security module and the only one to offer dual, hot-swappable power supplies. HSMs are widely …
New software filtering client for laptops
SmoothWall announced the release of Mobile Guardian – a new software filtering client, designed to prevent roaming laptop users from accessing inappropriate and …
BitDefender for HTTP proxy for Linux released for beta testing
BitDefender announced that BitDefender for HTTP Proxy for Linux is available for beta testing. It offers advanced features, including: Real-Time Scanning of Internet Traffic: …
Endpoint security from Check Point
Check Point announced Check Point Endpoint Security R72, a new version of their single agent for endpoint security. New Check Point WebCheck browser security protects …
Juniper’s adaptive threat management solutions for distributed enterprises
Juniper Networks Adaptive Threat Management Solutions, based on a dynamic security infrastructure, deliver security at scale that is identity aware and application aware, …
Security code review service for threat identification
Comsec Consulting launched CODEFEND, a new application security service which combines technology and expert human analysis, for Outsourced Security Code Review and Threat …
Users voice key factors of virus protection
In an online survey conducted during May 2009, 9325 surfers told IT security specialist Avira about the criteria they use when choosing their virus protection. International …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics