Help Net Security
The Chinese time bomb
At Seculert, when we analyze a targeted attack, we are trying to help our customers understand the intention of the attackers, as we look how the attack evolves over time. In …
Static analysis tool for examining binaries
GrammaTech announced a static-analysis tool for analyzing binary libraries and executables. CodeSonar for Binaries enables users to examine software for security …
Dell SecureWorks expands incident response services
Dell SecureWorks is expanding its incident response (IR) services to counter the growing severity and frequency of breaches. Many organizations aren’t equipped …
Enterprise security for businesses addressing privacy obstacles
Protegrity announced deeper enterprise security for global businesses addressing privacy obstacles such as cross-border data transfer and industry specific regulatory …
Longline phishing attacks rely on mass customization
Proofpoint released a wide-ranging study that identified a new class of sophisticated and effective, large-scale phishing attack dubbed “longlining”. Longlining, …
Older MiniDuke strain found, raises questions about its origins
A version of MiniDuke – the cyberspy malware aimed at governments and agencies in Europe and elsewhere – has been operating for at least 21 months, internet …
Conflicting views on cloud security responsibility
CA and the Ponemon Institute released a study that shows companies have improved their practices around cloud computing security compared to a previous study from 2010. Still, …
Safe iOS web surfing for kids
Net Nanny for iOS brings safe web browsing and surfing for kids of all ages to iPod Touch, iPhone and iPad using iOS 5.0 or later. Available from the App Store for $4.99, Net …
Open standards are key for security in the cloud
The current divide between proprietary and open approaches to enterprise cloud computing has implications beyond the obvious. More than just issues of cloud interoperability …
Dangerous beans: Oracle deep in the storm
Last week security researchers from FireEye discovered a new Java exploit that works against the latest versions of Java (version 6 update 41 and version 7 updated 15) making …
Half of companies have lost a device with important data
Half of companies have lost a device with important company data on it, causing security implications for over a fifth of organizations, according to Varonis. 57% of employees …
VASCO launches new card reader for transaction signing and PKI applications
VASCO launched DIGIPASS 870, a USB connectable card reader which can be used in both connected and unconnected mode. In connected mode DIGIPASS 870 can be used for a number of …
Featured news
Resources
Don't miss
- Your encrypted data is already being stolen
- REMnux v8 brings AI integration to the Linux malware analysis toolkit
- LockBit 5.0 ransomware expands its reach across Windows, Linux, and ESXi
- Microsoft equips CISOs and AI risk leaders with a new security tool
- OpenClaw creator Peter Steinberger joins OpenAI