Help Net Security
Internal network security threats online encyclopedia
Promisec has released an online encyclopedia of internal network security threats. The encyclopedia, which can be viewed by anyone for free, is continually updated with …
Confidential school records made available online
Recent media reports state that more than 100,000 student records were accidentally made available online. The security blunder by The Princeton Review, an educational …
Code signing certificates for Adobe AIR applications
VeriSign today released VeriSign Code Signing Certificates for an application on Adobe AIR. Adobe AIR is a cross-operating system runtime that enables rich Internet …
Deep packet inspection testing methodology videos and documentation
BreakingPoint Systems released a detailed test methodology and video series that enables network engineers to test the deep packet inspection (DPI) features of content-aware …
Internet Terrorist: Does Such A Thing Really Exist?
Recently, I have experienced an increase in organizations questioning how real is the threat of Internet terrorism and what they can do to protect themselves. As a former …
New version of SifoML e-mail gateway appliance
O2Security released the newest version of its email gateway appliance. SifoML v3.9 provides new features and enhancements, including the ability to prevent attacks on networks …
Summary of changes to next version of PCI Data Security Standard
The PCI Security Standards Council (PCI SSC) announced the summary of forthcoming changes to PCI DSS as it moves from version 1.1 to the previously announced version 1.2 in …
Personal data of 92,095 credit applicants exposed in a security breach
A computer server within InterActive Financial Marketing Group (IFMG), a division of Dominion Enterprises located in Richmond, Virginia, was hacked into and illegally accessed …
Symantec to acquire PC Tools
Symantec Corp. signed a definitive agreement to acquire PC Tools, a global provider of innovative software products designed to protect the privacy and security of Windows …
Reputation Attacks: A Little Known Internet Threat
Reputation attacks target both individuals and companies, and their goal is to ruin the victim’s reputation. While attack techniques are varied, the consequences are …
Detect and prevent data loss due to misdirected email
NextLabs released Enterprise DLP 3.5, the latest release of its host-based data loss prevention system that proactively applies identity-driven policy to prevent external data …
OTS Red Flag examination procedures
Now that the Office of Thrift Supervision (OTS) has unveiled its FACT Act Red Flags examination procedures, financial institutions are getting the first concrete look at what …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount