Help Net Security
Cybercrime moving companies towards lifecycle data protection programs
Organizations are moving from a siloed approach in addressing data security challenges to lifecycle protection out of necessity, according to Gary Palgon, nuBridges’ VP …
Amazon Virtual Private Cloud now in limited beta
Amazon Virtual Private Cloud (Amazon VPC) is a secure and seamless bridge between a company’s existing IT infrastructure and the AWS cloud. Amazon VPC enables …
SuperSonic USB flash drive with fast file transfer
BlockMaster launched SafeStick SuperSonic, a USB flash drive that enables users to transfer files and information securely in just a few seconds. The USB revs up to 23Mbyte/s …
Cloud and server-based 2-factor authentication via software or SMS tokens
CryptoCard announced CryptoCard ICE, that either as a server-based solution (BlackShield ICE) or as a cloud-based service (Crypto-Mas ICE) reduces the risks that remote …
Virtual desktop NAS software from RingCube
RingCube announced vDesk version 2.1, an enterprise desktop virtualization solution that simplifies the creation, access and management of Windows desktops through workspace …
Opera 10 release candidate launched
Opera released the first release candidate for Opera 10. All points to a September 1st launch for the final version of Opera 10. The Opera 10 release candidate is feature …
All GSM calls under threat from hackers
At the recent Hacking at Random (HAR) conference, Karsten Nohl detailed plans for cracking standard GSM cell phone encryption, known as A5/1, and making the results available …
Jessica Biel, the most dangerous celebrity in cyberspace?
Jessica Biel has overtaken Brad Pitt as the most dangerous celebrity to search in cyberspace, according to McAfee. For the third year in a row, McAfee researched …
Almost 80% of Flash and Acrobat Reader are vulnerable
According to the “Flash Security Hole Advisory” by Trusteer, even though Adobe released a critical patch for Acrobat Reader and Flash, almost 80% of Internet users …
Short URL spam targets health concerns
According to Symantec’s MessageLabs Intelligence report, shortened-URL spam continues to be a popular technique for spammers seeking to sell drugs online. Spammers are …
The habits of hackers, a survey from DEFCON
Enjoy the rest of your summer vacation say the hacking community, as you’re far less likely to be targeted now than during your Christmas and New Year vacation. …
Database security for Microsoft SQL Server
Sentrigo announced Hedgehog 3.0, which now supports Microsoft SQL Server 2008 running on Windows Server 2008, as well as SQL Server 2005 and SQL Server 2000 running on earlier …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)