Help Net Security
New book: “Cloud Computing: Implementation, Management, and Security”
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, …
Apple Xsan 2.2 released
Apple today released version 2.2 of Xsan, its 64-bit cluster file system specifically designed for small and large computing environments. The problem fixed in Xsan 2.2 was …
PhoneCrypt now available for the iPhone
PhoneCrypt is a solution based in military grade encryption (RSA 4096 bits and AES 256 bits). It works in real time, without interfering in the functions of the mobile phone, …
Intrusion prevention for small and medium enterprises
TippingPoint introduced two new intrusion prevention systems designed to secure network traffic for small and medium enterprises. The TippingPoint 110 and TippingPoint 330 …
Enterprise Wi-Fi BlackBerry client
iPass launched Blackberry iPassConnect Client, an enterprise Wi-Fi client. The application works in conjunction with the BlackBerry Enterprise Server, giving IT administrators …
Video: Man busted installing ‘skimming’ device to ATM
Below is CCTV footage form Brazil.
Draft eSecurity code for improved net security
Australia’s Internet Industry Association (IIA) has released a draft eSecurity code to ISPs throughout the continent, to serve as a guide for improving net security. …
Cross Widget DOM access: Spy on the page
Widgets, Gadgets or Modules are very common and powerful feature of Web 2.0 applications. They convert a single loaded page in the browser to multi-threaded application. They …
Tor for Android mobile devices
TorProxy is an Android application that makes it possible to use Internet sites and services anonymously from a mobile device. This is possible thanks to the Tor network and …
CA acquires NetQoS for $200 million
CA announced that it has signed a definitive agreement to acquire privately-held NetQoS Inc., a provider of network performance management and service delivery solutions, for …
2000% rise in NDR spam
In August 2009, PandaLabs recorded a 2000 percent increase in the amount of different NDR spam messages in circulation (compared to the number of samples detected between …
Symark acquires BeyondTrust and adopts company name
Symark announced the acquisition of BeyondTrust. The combined organization will operate under the name BeyondTrust, which reflects the company’s mission to provide a …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform