Help Net Security
Global UTM and NGFW market to reach $5.32 billion in 2018
The dynamic nature of security threats and network traffic has challenged the efficacy of legacy firewall systems, paving the way for next generation firewalls (NGFW) and …
ESET analyzes first Android file-encrypting, TOR-enabled ransomware
One year ago, Android Defender, a hybrid comprising characteristics of a rogue AV and ransomware (the lockscreen type, not a file-encryptor) was discovered. Last month we saw …
Why botnet takedowns can cause more harm than good
Zeus is a well-known and highly successful crimeware kit – the flat-pack furniture of the virus world. It is under constant development by several criminals or groups …
How do the new features in OS X Yosemite and iOS 8 impact security and privacy?
At the annual Worldwide Developer’s Conference (WWDC) Apple announced the latest versions of OS X and iOS. With this announcement came a long list of new features and …
What are the top security concerns of senior IT executives?
Most C-level executives would agree that protecting a company’s confidential data and trade secrets from the prying eyes of competitors is critical. Yet interactive …
Too many organizations miss their service availability goals
Continuity Software announced the results of its 3rd annual Service Availability Benchmark Survey, designed to enable IT infrastructure, business continuity and disaster …
Safari to include privacy-protecting search engine
Apple announced the inclusion of DuckDuckGo, the search engine that doesn’t track its users, in the future versions of Safari on iOS and OS X. This makes DuckDuckGo the …
DARPA’s Cyber Grand Challenge offers $3.75 million in prizes
Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA’s Cyber Grand …
The disruption of Cryptolocker and GameoverZeus
Part of the difficulty in unraveling ZeuS botnet infrastructure is mapping it out. Attackers usually plant a generic dropper within an emailed file, disguised to look like a …
Opportunities and challenges for CIOs in different industries
CIOs around the globe may share common concerns, but there are considerable differences in their priorities, according to a global survey of CIOs by Gartner, Inc.’s …
International action against Gameover Zeus botnet and CyptoLocker ransomware
On Friday, 30 May 2014, law enforcement agencies from across the world, supported by the European Cybercrime Centre (EC3) at Europol, joined forces in a coordinated action led …
Mobile ad libraries create major risk for enterprise data
Every day at Mojave Threat Labs, our research team analyzes thousands of mobile apps using more than 200 individual risk factors. One of the key risk factors that we track is …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated