Help Net Security
Fraud and identity theft camouflaged by DDoS attacks
Prolexic shared attack signatures and details that are helpful to detect and stop DDoS attacks from the Drive DDoS toolkit, an attack tool often used as a source of …
Five ways to get the most out of your sandbox
There’s been a lot of talk lately about the value of sandbox technology as part of a cybersecurity defense. While sandboxes are a valuable tool in the hands of a …
Banking Trojans dominate malware in e-mail traffic
The percentage of spam in email traffic in July was up only 0.1 percentage points and averaged at 71.2 per cent, according to Kaspersky Lab. Malicious attachments were found …
Three factors will impact enterprise cloud adoption
Although the use of cloud services is growing faster than the overall enterprise IT market, it is still a small part of overall IT spending, according to Gartner. A recent …
Australian organizations are not effectively managing IT risks
The Australian chapters of ISACA highlighted the potential for security breaches and major technology disasters at leading Australian organizations, with 60% of IT …
WatchGuard updates email and web security appliance
WatchGuard Technologies introduced the WatchGuard XCS 880, which is designed to meet the email and web-based content security needs of large enterprises. Delivering 20 percent …
Would you publicly report a security breach?
Recent research by AlienVault revealed that only 2% of surveyed EU companies would be willing to go public should they suffer a security breach. 38% opted to inform the …
Got malware?
94.7 percent of Americans received at least one email containing a virus, spyware, or malware, according to Halon. About one in eleven (8.8%) opened the attachment and …
HP releases Fortify Static Code Analyzer 4.0
HP announced Fortify Static Code Analyzer (SCA) 4.0, delivering a new approach that enables organizations to assess the security of software up to 10 times faster than …
Xceedium extends security capabilities to VMware vShield and vCloud
Xceedium is extending Xsuite’s security and audit capabilities to VMware vShield and vCloud. Customers using VMware’s software-defined datacenter tools and its …
Hacker admits to selling access to company networks, supercomputers
A Pennsylvania man pleaded guilty today to charges stemming from his participation in a scheme to hack into computer networks and sell access to those networks. Andrew James …
Shielding targeted applications
When we discuss exploit prevention, we often talk about “targeted applications.’ This term refers to end-user applications which can be exploited by hackers for …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation