Help Net Security
Week in review: Facebook, Apple hacks, APT1, and mobile phishing
Here’s an overview of some of last week’s most interesting news, reviews and articles: Facebook employees ambushed by zero-day exploit Facebook has admitted that …
Real world social engineering challenge at HITBSECCONF2013
Global IT services provider Sogeti will launch their social engineering challenge during the Hack In The Box Amsterdam conference in April. The challenge will be to social …
Hidden security threats on enterprise networks
Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …
Silent Text iOS app can auto-delete sent messages
Silent Circle announced features in the company’s updated Silent Text secure messaging app for iOS. Customers can now: Send private encrypted messages and use Silent …
IBM shows where vulnerabilities appear in iOS apps
IBM announced security software that helps organizations proactively reduce the security risk to iOS enterprise apps. Clients will be able to build security testing into the …
ESET releases two-factor authentication software solution
ESET announced the availability of ESET Secure Authentication, a two-factor authentication (2FA) software solution for SMBs that makes use of remote end-users’ mobile …
IS Decisions releases FileAudit 4
IS Decisions released FileAudit 4, its file audit, archiving and reporting tool. It is the only file auditing solution Microsoft-certified for compliance with Windows 8 and …
Citrix introduces XenMobile MDM
Citrix announced XenMobile MDM, an enterprise mobile device management solution that gives users device choice while also enabling IT to meet its management and compliance …
Malicious URLs eclipsing botnets as malware distribution leader
McAfee Labs revealed that sophisticated attacks originally targeting the financial services industry are now increasingly directed at other critical sectors of the economy, …
25% of DDoS attacks in 2013 will be application-based
Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner. During such incidents, attackers send …
Security is top reason why IT adopts single sign-on
Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from …
FireMon expands situational awareness with Security Manager 7.0
FireMon announced new capabilities in Security Manager 7.0 that improve organizational ability to identify, understand and manage changes in security posture – in …
Featured news
Resources
Don't miss
- Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363)
- Is Agentic AI too smart for your own good?
- Hottest cybersecurity open-source tools of the month: February 2025
- What cybersecurity pros read for fun
- Is your email or password among the 240+ million compromised by infostealers?