Help Net Security
Updates to the MIMEsweeper Web Appliance
Clearswift updated its appliance by adding full HTTPS content analysis, as well as reverse proxy deployment to protect web servers from Malware and inappropriate content. …
Securing Moving Targets
Newton’s first law of motion states that a moving body will want to keep moving. The same law also seems to apply to business data, and the problem is trying to stop …
Cold boot attacks on encryption keys
The Center for Information Technology Policy at Princeton University released a paper that shows that disk encryption, the standard approach to protecting sensitive data on …
Outstanding Smart Card Achievement award nomination invitations
The Smart Card Alliance is accepting nominations for its “Outstanding Smart Card Achievement” (OSCA) awards, recognizing those who have significantly impacted and …
Canadian botnet busted
IT security and control firm Sophos has welcomed news that Canadian authorities have apprehended 17 people suspected of running the largest and most damaging cybercrime …
Eclipse Higgins, a free user-centric identity framework
The Eclipse Foundation released Eclipse Higgins 1.0, a freely downloadable identity framework designed to integrate identity, profile and social relationship information …
WorkBook: secure Facebook for the enterprise
WorkBook is a Facebook application that allows employees to use the social networking site to communicate securely. It has the same look and feel as Facebook, and is …
New GFI EventsManager allows extensive hardware monitoring
GFI Software announced today the release of a new version of GFI EventsManager. Version 8 allows administrators to monitor an extensive range of hardware devices from over 20 …
Poisoned adverts lead to PC and Mac scareware
IT security and control firm Sophos is advising firms to properly secure their users’ web activity following the discovery of a poisoned web advert campaign on …
Regionalized malware rising
Cybercriminals are increasingly crafting attacks in multiple languages and are exploiting popular local applications to maximize their profits, according to a new McAfee …
Growth of underground cybercrime economy
According to research from Trend Micro’s TrendLabs, the number of compromised Web sites are slowly outnumbering malicious ones created specifically by cyber criminals. …
Report describes IPv6 security issues for U.S. Government agencies
Juniper Networks just released “An IPv6 Security Guide for U.S. Government Agencies”. The report describes key issues and best-practices for government CIOs, CISOs …
Featured news
Resources
Don't miss
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk