Help Net Security
Large-scale DDoS attacks grow bigger and more diversified
In addition to increasing attack sizes, attack volume grew in Q4 2012 and reached the highest number of attacks Prolexic has logged for one quarter. Traditional Layer 3 and …
ObjectRocket launches MongoDB cloud service
ObjectRocket launched its fast and scalable MongoDB database-as-a-service (DBaaS). The platform is specifically architected to provide a fast and predictable MongoDB …
Embracing BYOD means understanding cloud and application security
Company policies supporting Bring Your Own Device are being widely embraced as a win-win initiative that improves employees’ experience and reduces IT costs, according …
Many Fed smartphones have zero password protection
A new report showcases increased security risks with mobile device usage within Federal government as adoption of smartphones and other mobile devices becomes more widespread. …
SMS spam threat targets Apple fans
AdaptiveMobile today sheds light on the extent of a new global SMS spam threat. According to Ongoing Threat Analysis (OTA) which examines mobile security threats from around …
ThreatTrack 2.0 plugs malware holes in real-time
GFI Software launched GFI ThreatTrack 2.0, the latest version of the security intelligence solution that provides users with visibility into the threat landscape. It produces …
Password cracking and team testing with CORE Impact Pro
CORE Security released CORE Impact Pro 2013, the latest version of its vulnerability assessment and penetration testing software, that allows organizations to proactively test …
Intel and Facebook collaborate on future data center rack technologies
Intel and Facebook aim to define the next generation of rack technologies used to power the world’s largest data centers. As part of the collaboration, the companies …
How the security threat landscape will evolve this year
Where 2012 was a period of great innovation amongst cybercriminals and hackers – many of whom keenly develop new and hybridized attack vectors that build on a constantly …
Microsoft advances the Cloud OS
Microsoft announced new solutions to help enterprise customers manage hybrid cloud services and connected devices. System Center 2012 SP1, the enhanced Windows Intune, Windows …
Company bosses slacking on hacking
Company bosses across the UK have a complacent attitude toward cybercrime and are inviting criminal attacks due to their sloppy approach to internet security, reveals new …
CIOs agree: Digital technologies are top priorities
Enterprises realize on average only 43 percent of technology’s business potential, according to a global survey of CIOs by Gartner’s Executive Programs. That …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)