Help Net Security
Red Hat delivers cloud management for OpenStack
Red Hat announced the next release of its cloud management platform, Red Hat CloudForms 3.0. CloudForms already provided essential enterprise-level management and automation …
Hypervisor-based, hardware-assisted system monitoring
In the last few years, many different techniques have been introduced to analyse malicious binary executables. Most of these techniques take advantage of Virtual Machine …
Most visits to a login page are made by malicious tools
Incapsula surveyed 1,000 websites over a 90-day period, during which we recorded over 1.4 million unauthenticated access attempts and 20,376 authenticated logins. Their data …
New Microsoft 0-day vulnerability under attack
Microsoft has released security advisory KB2896666 informing of a vulnerability (CVE-2013-3906) in the TIFF graphics format that is seeing limited attacks in the Middle East …
IT leaders on the state of IT spending
New research highlights an increasing optimism in the technology spending landscape. Nearly 900 IT leaders (CIOs, IT VPs, IT directors, IT hiring managers) were polled by …
SafeToGo USB 3.0 hardware encrypted flash drive released
Cardwave has partnered with BlockMaster to produce the next generation of highly secure USB 3.0 compliant flash drives. The new device will typically work at 2 to 3 times …
Kaspersky updates Small Office Security
Kaspersky Lab has announced a new version of Kaspersky Small Office Security, a security solution built specifically for businesses with fewer than 25 employees. This solution …
Most users don’t trust app developers with their data
Research by ISACA shows that, of 1,000 employed consumers surveyed in the UK, only 4% named the makers of their mobile phone apps as the entity they most trust with their …
LastPass 3.0 comes with new design and features
Popular password manager LastPass has reached version 3.0. The new release features an updated, clean design across the LastPass browser addons, the iOS and Android mobile …
What happens when a scammer tries to scam a security researcher?
I just got off the phone with a very nice gentleman from the “service center for the Windows operating system computers.” During the call, he informed me that they …
The dangers of weakening cybersecurity to facilitate surveillance
In response to the controversy over the alleged surveillance practices of the NSA, the White House established the Review Group on Intelligence and Communication Technologies, …
Triumfant detects and stops in-memory malware attacks
Advanced Volatile Threats are malware attacks that take place in a computer’s RAM or other volatile memory, and are difficult to detect because they are never stored to …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC