Help Net Security
The mobile cybercrime landscape is becoming more defined
McAfee found that Android-based malware achieved a 35 percent growth rate not seen since early 2012. This rebound was marked by the continued proliferation of SMS-stealing …
Rapid7 unveils analytics for security controls and user risk
Rapid7 showcased two new IT security insight solutions at the UNITED 2013 security summit. Lee Weiner, senior vice president of products and engineering at Rapid7 comments: …
Veeam Backup & Replication 7 released
Veeam Software announced Veeam Backup & Replication 7, which introduces built-in WAN acceleration and backup from storage snapshots. Built-in WAN acceleration copies data …
MitB malware targets steam
When cybercriminals use Man-in-the-Browser (MitB) malware to commit online fraud, financial institutions are not their only targets. Dating, eCommerce, hospitality, and travel …
Nmap 6.40 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Why continuous IT cost optimization is essential
After years of tactical cost-cutting, many organizations now face the challenge of continuous IT cost optimization after the realization that optimization practices are never …
EVault backup appliances now with cloud-connected software for failproof recovery
EVault announced a new portfolio of EVault backup appliances, expanding its enterprise-grade appliances to accommodate the backup and recovery needs of any organization …
ENISA analyzes major security incidents in the EU
The European Union Agency for Network and Information Security (ENISA) today issued a new report providing an overview of the major outage incidents in the EU in 2012. The …
Scanning the Internet in less than an hour
Scanning the Internet used to be a task that took months, but a new tool created by a team of researchers from the University of Michigan can scan all (or most) of the …
Advanced threats to drive growth in new product segment
As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly. The …
Lucrative business: cybercrime-as-a-service
With news of the struggling high street becoming a regular occurrence, it is not surprising that increasingly small businesses are seeking opportunities online. However …
Manage security across multiple systems with Milan 3.0
Prosperoware Milan 3.0, an integrated platform for information governance, now includes a new module that helps firms move to a “need-to-know” security model. …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark