Help Net Security
The sophistication of risky apps, mobile misbehavior and spyware
McAfee released the results of a new report, documenting sophisticated and complex risky apps containing multi-faceted scams, black market crimes, drive-by downloads and …
F5 Networks releases hybrid cloud solution for mobile application management
F5 Networks announced F5 Mobile App Manager, a new hybrid cloud solution for mobile application management that enables organizations to safely support enterprise BYOD …
Duo Security launches secure mobile ID
Duo Security announced that the high level of security traditionally associated with hardware smart cards is now available on consumer mobile devices that use Duo’s …
Modeling, customizing, and automating applications with AWS OpsWorks
Amazon Web Services launched AWS OpsWorks, an application management solution for the complete lifecycle of complex applications, including resource provisioning, …
Virtual appliance fuels Bring Your Own Identity
NetIQ announced SocialAccess, a virtual appliance that allows business and government entities to leverage social identity providers to share select identity information for …
Antibot: Network-based botnet removal tool
Botnets are flourishing with new packaging, new methods and new business models. ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, …
Week in review: Bit9 hack, malicious applications of augmented reality, and Adobe 0-day mitigation
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Bit9 hacked, its certificates stolen and used to sign malware Bit9, …
Most Americans think cyber warfare is imminent
A national survey of Americans shows a majority fear that cyber warfare is imminent and that the country will attack or be attacked in the next decade. Despite the threat, …
Mobile network infections increase by 67%
Kindsight released a new report that reveals security threats to home and mobile networks, including a small decline in home network infections and an increase in mobile …
Successful ways of undermining cybercrime ecosystems
Most cybercrime is carried out by a loose confederation of independent contractors who work together when necessary through online forums and “partnerkas” that …
Video: Pirate Party MEP talks online child safety
Children and teenagers benefit hugely from being online, but they can also be targets of crime and exploitation as in any other environment. Child safety online is listed as …
Symantec unveils new SSL algorithms and web security products
Symantec unveiled new updates to its Website Security Solutions portfolio with capabilities to meet the increasing security and performance needs for connected businesses. The …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation