Help Net Security
Neohapsis and Arxan protect sensitive apps
Neohapsis and Arxan announced a partnership to offer enhanced tamper-resistance and self-defense built into a comprehensive application security strategy. According to recent …
Online backup for mobile devices: Key factors to consider
Most technology users keep personal information (contacts, calendars, documents, photos, etc.) on their mobile devices. That information isn’t protected if the mobile is …
Arbor Networks acquires Packetloop
Arbor Networks has acquired privately held Packetloop, an innovator and provider of Security Analytics. Terms of the deal were not disclosed. Arbor plans to invest in and …
Training: The Art of Exploiting Injection Flaws
HITBSecConf 2013 Malaysia will host the widely acclaimed course The Art of exploiting Injection Flaws in Kuala Lumpur on 14 and 15 October 2013. This hands-on session will …
Login and password troubles revealed
Increasingly lengthy and complex log-in processes and web forms are driving consumers away from websites, according to Ping Identity. The study revealed that an overwhelming …
Leaked FinFisher presentation details toolkit’s spying capabilities
F-Secure’s Mikko Hypponen has shared several interesting slides from a presentation that displays the wide range of capabilities offered by the FinFisher commercial …
Most security managers don’t trust their apps
Application vulnerabilities are a major factor in the cybercrime game. More than 500 CISOs and Security managers have been interviewed by Quotium about the security state of …
Government employees realize the importance of cyber security
Despite high awareness in the public sector about cyber-security risks and the threat to national security, government officials feel that not enough attention has been placed …
Fraud and ATM attacks hit Germany hard
FICO released new data showing the high rate of card-not-present (CNP) fraud on Germany’s credit cards in 2012, showing that 70 percent of the 2012 fraud on …
Week in review: Smart building security, Tor usage doubles, and how Snowden stole NSA documents
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: There are no winners in the blame game Every time a major …
Medical lab allegedly exposed consumer info on P2P network
The Federal Trade Commission filed a complaint against medical testing laboratory LabMD claiming that in two separate incidents, LabMD collectively exposed the personal …
Fraud and identity theft camouflaged by DDoS attacks
Prolexic shared attack signatures and details that are helpful to detect and stop DDoS attacks from the Drive DDoS toolkit, an attack tool often used as a source of …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring