Help Net Security
Unpatched, vulnerable PDF readers leave users open to attack
Unpatched, vulnerable PDF readers are a big security issue for private PC users, according to Secunia. 14% of PC users in the US (up from 12.9% last quarter) have an unpatched …
Threats on government networks remain undetected for 16 days
Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected – hiding in plain sight.The good …
High volume DDoS attacks still persistent
Arbor Networks released global DDoS attack data that shows a continuation of extremely high volume attacks. In Q1 2015, there were 25 attacks larger than 100Gbps globally.In …
Police dismantle gang of online fraudsters and romance scammers
The Italian Financial Police (Guardia di Finanza), supported by Europol, arrested 10 members of a transnational criminal group. The criminals, mainly Nigerian citizens, were …
Big Data and analytics are changing the cybersecurity landscape
Stealing media headlines with a new breach almost every week, cybersecurity has skyrocketed to the top of boardroom discussion agendas. Yet an average of 35 percent of all …
Security still the top issue preventing payments investment
A new payments survey of more than 1,100 executives representing banks, retailers and billing organizations across the world revealed that although 80 percent of them …
Only 57% of critical IT infrastructure issues are detected before business impact
Organizations large and small are struggling to meet their Key Performance Indicator (KPI) goals and prevent IT issues before they adversely impact the business, according to …
A closer look at LepideAuditor for File Server
Organizations host file servers to store critical data to and valuable information about its business, customers, and employees. Access to file servers is authorized only for …
The invasion of biometrics
Depending on where you stand biometrics is a good thing or something that is downright sinister. The truth is that to a degree biometric technologies have a valid and useful …
NSA surveillance since Snowden revelations is strong as ever
A Thycotic survey of 202 RSA Conference 2015 attendees found that 94% feel that NSA’s surveillance of U.S. citizens has increased or remained the same since Edward Snowden …
Lepide Exchange Migration Services launched
Lepide Software launched Lepide Exchange Migration Services – a remote, end-to-end migration services for doing Exchange-to-Exchange (on-premise) migrations and Exchange to …
Week in review: RSA Conference 2015, security guidance, mobile malware
Here’s an overview of some of last week’s most interesting news and articles. We also have in-depth coverage of RSA Conference 2015, with product releases, news, …
Featured news
Resources
Don't miss
- FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)
- Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)
- Claude Code source leak exploited to spread malware
- Trivy supply chain attack enabled European Commission cloud breach
- Microsoft releases open-source toolkit to govern autonomous AI agents