Help Net Security
New book: “SQL and Relational Theory”
SQL is ubiquitous, but it’s hard to use. “It’s complicated, confusing, and error prone—much more so, I venture to suggest, than its apologists would have …
The environmental impact of spam
McAfee announced new research findings that reveal spam e-mail is not only a nuisance, but is damaging to the environment and substantially contributes to green house gas …
Verizon study finds significant rise in targeted attacks
More electronic records were breached in 2008 than the previous four years combined, fueled by a targeting of the financial services industry and a strong involvement of …
New OS for securing corporate information on enterprise networks from Alcatel-Lucent
Alcatel-Lucent announced a new operating system including an advanced set of features that enable IT departments to quickly and easily secure their network and unify access …
Threat report finds malicious activity continues to grow at a record pace
Symantec announced that malicious code activity continued to grow at a record pace throughout 2008, primarily targeting confidential information of computer users. According …
Productivity and Internet abuse: How to improve one by eliminating the other
It is not long ago that IT managers talked about web threats as mainly the downloading and viewing of inappropriate content in the workplace. However, times have changed and …
Gartner: Phishing attacks on U.S. consumers increased 40 percent in 2008
More than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008, a 39.8 percent increase over the number of victims a year earlier, …
Samsung PropelPro: a sliding smartphone with support for security
The Propel Pro, the next generation smartphone from Samsung Mobile, is a compact slider that opens to reveal a full QWERTY keyboard that makes sending text messages and …
HITBSecConf2009 Malaysia: Call for Papers now open
The Call for Papers (CFP) for the 7th Hack in The Box Security Conference to be held in Malaysia is now open. The event will run from the 5th till the 8th of October and CFP …
Independent survey finds enterprises at-risk from insecure software
Veracode announced the findings of an independent commissioned study conducted by Forrester Consulting – Application Risk Management in Business Survey. The survey …
Sun unveils blades architecture with new networking, manageability, cooling management
Sun Microsystems launched new products and technologies that span the data center and include a new blades architecture, new networking technologies and seven new systems …
Trend Smart Surfing for iPhone and iPod touch
Trend Micro recently launched "Trend Smart Surfing", a freeware iPhone application that provides URL reputation checks for iPhone users browsing the Web.
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption