Cloud computing will transform mobile applications
Apple’s iPhone sparked an explosion in consumer awareness of mobile applications. New applications are proliferating and “app stores” are springing up. But …
The upcoming Gartner Information Security Summit 2009 UK
The Gartner Information Security Summit will take place in September in London and Help Net Security is one of the proud media sponsors of the event. The summit will provide a …
New attack exploits an unpatched Microsoft vulnerability
PandaLabs detected some one hundred Web pages, mainly hosted in China, modified to infect users by exploiting an unpatched Microsoft vulnerability. The vulnerability lies in …
ePKI Lite: Software as a Service PKI solution
GlobalSign launched Enterprise PKI Lite, a Software as a Service (SaaS) PKI solution that allows small to medium sized enterprises to issue Digital Certificates to as few as 5 …
Gartner: Worldwide IT spending to decline 6% in 2009
Worldwide IT spending is on pace to total $3.2 trillion in 2009, a 6 percent decline from 2008 spending of $3.4 trillion, according to Gartner. Continued weak IT spending …
Altor VF 3.0: VMsafe virtual firewall with intrusion detection
Altor Networks announced the Altor VF 3.0 virtual firewall with integrated intrusion detection. The Altor VF is the first product to be integrated with VMware VMsafe network …
Malicious use of Twitter
A worm appeared in April which used a cross-site scripting technique to infect Twitter users when they visited the profiles of other infected users. It then infected the new …
Trojans were 70% of new malware detected between April and June
One of the most notable findings of the PandaLabs report is the 6.25% drop in spyware, which now represents just 6.9% of all new malware. In contrast, adware rose dramatically …
OpenTrust Mobile for iPhone
OpenTrust, a provider of open and secure IT ecosystems announced full support for mobile authentication for smartphones. The OpenTrust IT Trust and Security platform is now …
Top ten e-threats for June 2009
BitDefender released the top ten e-threats for the month of June. Five of the ten worst e-threats are Trojans, making this the best represented e-threat category. In tenth …
New ENISA Quarterly Review available for download
European Network and Information Security Agency (ENISA) Quarterly Review is a publication that is distributed to stakeholders and other interested readers every three months. …
New cryptanalytic attack on AES
Alex Biryukov and Dmitry Khovratovich from University of Luxembourg published a paper titled “Related-key Cryptanalysis of the Full AES-192 and AES-256”. In this …