Developing Enterprise iOS Applications
If you plan to develop iOS applications in a corporate setting – for internal consumption or for sale to end users – you need to read this book. Veteran developer …
Fake US Airways emails lead to Zeus variant
A US Airways-themed spam campaign aiming at infecting users with a variant of the Zeus banking Trojan has been hitting inboxes for the last two weeks, says Kaspersky Lab …
UK govt to introduce new email and web usage monitoring law
The UK Conservative-Liberal Democratic Coalition government is trotting out a new version of the controversial Interception Modernisation Programme (IMP) that was proposed by …
Pastebin to speed up takedown of sensitive information
The owner of Pastebin.com, the preferred pastebin site of Anonymous-affiliated hackers, is looking to clean up the site’s image by improving detection and removal of …
New Ice malware attacking Facebook users
Trusteer researchers have discovered a new configuration of the Ice IX malware that attacks Facebook users after they have logged in to their account and steals credit card …
Sophos acquires DIALOGS to provide mobile device protection
Sophos has entered into a definitive agreement to acquire DIALOGS, a privately-held provider of mobile management solutions, headquartered in Germany. DIALOGS, a mobile device …
Mac Trojan infects machines via unpatched Java bug
Flashback Trojan variants have been targeting Mac users since September 2011, and they have gone through a variety of changes and techniques aimed at achieving its …
First 4TB enterprise hard drive
HGST introduced the first 4TB enterprise-class hard drive family, the Ultrastar 7K4000. As the only 4TB 7,200 RPM enterprise-class drive in the industry, and one with a 2.0 …
ISO 27001 implementation: How to make it easier using ISO 9001
ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …
Top concern? Mobile device vulnerability management
Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …
New SDKs for biometric identification and object recognition
Neurotechnology released new versions of the company’s product line of SDKs for biometric fingerprint, face, iris and voice identification and object recognition. The …
A walk through the expo at InfoSec World 2012
Taking place right now in Orlando, Florida, is InfoSec World Conference & Expo 2012, and Help Net Security is on-site. Here’s a peek at the show floor featuring …
Featured news
Resources
Don't miss
- CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073)
- Official Xubuntu website compromised to serve malware
- Agentic AI security: Building the next generation of access controls
- When everything’s connected, everything’s at risk
- AI’s split personality: Solving crimes while helping conceal them