Help Net Security
Microsoft to release seven bulletins next week
It is the beginning of March and Microsoft just published the Advance Notice for this month’s Patch Tuesday. We will get seven bulletins next week, affecting all …
The SCADA security challenge
One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform. SCADA stands for …
Abrupt drop in Symbian malware
In what may be the only good news for Symbian, F-Secure’s latest Mobile Threat Report shows a drop in malware targeting the declining platform to just four percent of …
SolarWinds Alert Central: Free tool for managing IT alerts
SolarWinds announced a first full-featured yet free product, SolarWinds Alert Central. IT pros can now centralize multi-system IT alerts in a single, consolidated view, give …
99 percent of web apps vulnerable to attack
A new Cenzic report demonstrates that the overwhelming presence of web application vulnerabilities remains a constant problem, with an astounding 99 percent of applications …
Identity theft on the rise this tax season
The threat of identity theft this tax season leaves consumers with more to worry about than whether or not a tax return is in the mail. A thief may use sensitive information, …
The Chinese time bomb
At Seculert, when we analyze a targeted attack, we are trying to help our customers understand the intention of the attackers, as we look how the attack evolves over time. In …
Static analysis tool for examining binaries
GrammaTech announced a static-analysis tool for analyzing binary libraries and executables. CodeSonar for Binaries enables users to examine software for security …
Dell SecureWorks expands incident response services
Dell SecureWorks is expanding its incident response (IR) services to counter the growing severity and frequency of breaches. Many organizations aren’t equipped …
Enterprise security for businesses addressing privacy obstacles
Protegrity announced deeper enterprise security for global businesses addressing privacy obstacles such as cross-border data transfer and industry specific regulatory …
Longline phishing attacks rely on mass customization
Proofpoint released a wide-ranging study that identified a new class of sophisticated and effective, large-scale phishing attack dubbed “longlining”. Longlining, …
Older MiniDuke strain found, raises questions about its origins
A version of MiniDuke – the cyberspy malware aimed at governments and agencies in Europe and elsewhere – has been operating for at least 21 months, internet …
Featured news
Resources
Don't miss
- AI is becoming part of everyday criminal workflows
- Why SOCs are moving toward autonomous security operations in 2026
- Binding Operational Directive 26-02 sets deadlines for edge device replacement
- Fake troubleshooting tip on ClawHub leads to infostealer infection
- Japanese chip-testing toolmaker Advantest suffers ransomware attack