Help Net Security
Sharp increase in blended, automated attacks
FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to …
Norman Shark updates Malware Analyzer G2
Norman Shark announced Malware Analyzer G2 (MAG2) 4.0, which provides hybrid analysis, and Network Threat Discovery (NTD) 5.1, a cyberattack discovery system that …
nPulse updates its flow and packet capture appliance
nPulse released a new version of its Capture Probe eXtreme (CPX) flow and packet capture appliance, which provides a packet indexing solution at 30 million packets per second. …
To achieve good security, you need to focus on business
In September 2001, as the Nimda computer worm devastated networks worldwide, we in IT security thought that the management will finally wake up and see how important it was to …
The scary implications of Google Glass
Google Glass, for all its promise, has some scary implications. Here is my list of potential challenges we face with Glass: User experience Social awkwardness Privacy (or lack …
Video: Hackers for hire
Hackers are the 21st century warriors who worry many. As everything we use becomes increasingly connected, so their opportunities to hack, divert or destroy increase. NATO …
Online privacy: How did we get here?
As technology has evolved over the past two centuries, so have our expectations about privacy. This new digital world allows us to connect with each other with increasing …
Don’t get pwned at Black Hat, DEF CON
I am not a paranoid person and most industry conferences I go to don’t generate any worries about security. You go and participate, but otherwise operate normally, …
Offshore providers with no cloud strategy risk their future
While the increased use of industrialized services will reduce the volume of traditional and customized services, the impact on offshore providers will be counterbalanced by …
Week in review: Critical SIM encryption flaw, Apple Dev Center hack, key security metrics
Week in review: Critical SIM encryption flaw, Apple Dev Center hack, key security metrics Here’s an overview of some of last week’s most interesting news, reviews …
Preventing the exploitation of human vulnerabilities
Secure Mentem released the Human Incident Response Service to specifically address the issue of exploiting human vulnerabilities. Some of the most noted attacks in recent …
NTODefend now more effectively blocks application vulnerabilities
NT OBJECTives announced that its NTODefend solution now blocks application vulnerabilities by approximately 30% more than the previous version. As a result, NTODefend’s …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC