Help Net Security
RFID solution for IT asset tracking
Companies are challenged with accounting for millions of dollars of owned and leased IT assets within their expansive data centers. Of even greater concern is the potential …
HNS Podcast: Penetration testing considerations
In this HNS podcast, Anothony Alves from CORE Security Technologies talks about penetration testing. He dicusses the things you should look for when considering doing a …
Windows Live Hotmail CAPTCHA cracked by spambots
Websense Security Labs ThreatSeeker technology has discovered that spammers in their recent tactics have drawn their attention towards traditional and infamous Hotmail, aka …
Unique exploitation scenario using a recently disclosed Flash vulnerability
Memory corruption vulnerabilities are becoming increasingly difficult to exploit, largely due to the protection mechanisms being integrated into most modern operating systems. …
PCI Security Standards Council issues Payment Application Data Security Standard
The PCI Security Standards Council, a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (DSS), PCI PIN Entry Device …
Data at rest security for Oracle customers goes global
Relational Database Consultants announced today that the Encryption Wizard, a leading security and encryption software offering for the Oracle RDBMS, now ships with Natural …
New version of Zertificon secure virtual mailroom
Z1 SecureMail family of products safeguards a company’s e-mail transmissions across the board with its encryption and signature – and, in the process, remains …
Post-April tips to prevent identity theft
Tens of millions of tax returns have just been filed electronically for the tax year 2007. Anyone who has filed their taxes this way and has their personally identifiable …
Check Point delivers new Power-1 appliances
Check Point today announced the launch of Check Point Power-1, a new line of Internet security appliances offering high-performance sites a simple, robust, and easy to manage …
New book: “Crimeware: Understanding New Attacks and Defenses”
The security threat landscape has dramatically changed in the past few years. In this single volume, “Crimeware: Understanding New Attacks and Defenses” an …
New book: “iPhone Open Application Development”
Certain technologies bring out everyone’s hidden geek, as the iPhone did instantly upon its release. Now programmers are yearning to showcase their applications on it, …
Top four malware security tips
Webroot has issued a white paper entitled ‘How to Protect Business from Malware at the Endpoint and the Perimeter’ that includes four key tips to protect …
Featured news
Resources
Don't miss
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats