Help Net Security
Designing and Implementing a Server Infrastructure
Prepare for Exam 70-413 and help demonstrate your real-world mastery of enterprise server design and implementation. Designed for experienced, MCSA-certified professionals …
Week in review: Remote Linksys 0-day root exploit discovered, the Pobelka botnet, and a year of Microsoft patches
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Looking back at a year of Microsoft patches Last year …
New RAT family makes its traffic look legitimate
RATs – Remote Access Trojans – are often used by cyber attackers to maintain a foothold in the infected computers and make them do things unbeknownst to their …
Security vulnerabilities in ESPN ScoreCenter mobile app
ESPN ScoreCenter, one of the most popular mobile sports apps on the market, has significant security vulnerabilities that could compromise users’ mobile devices, …
Why Facebook Graph Search will help cybercriminals
While Facebook’s newly announced graph search capability is awesome for people who like social networking, it also provides criminals with another source of information …
The end of strong password-only security
More than 90% of user-generated passwords will be vulnerable to hacking in a matter of seconds, according to Deloitte’s Canadian Technology, Media & …
Large-scale DDoS attacks grow bigger and more diversified
In addition to increasing attack sizes, attack volume grew in Q4 2012 and reached the highest number of attacks Prolexic has logged for one quarter. Traditional Layer 3 and …
ObjectRocket launches MongoDB cloud service
ObjectRocket launched its fast and scalable MongoDB database-as-a-service (DBaaS). The platform is specifically architected to provide a fast and predictable MongoDB …
Embracing BYOD means understanding cloud and application security
Company policies supporting Bring Your Own Device are being widely embraced as a win-win initiative that improves employees’ experience and reduces IT costs, according …
Many Fed smartphones have zero password protection
A new report showcases increased security risks with mobile device usage within Federal government as adoption of smartphones and other mobile devices becomes more widespread. …
SMS spam threat targets Apple fans
AdaptiveMobile today sheds light on the extent of a new global SMS spam threat. According to Ongoing Threat Analysis (OTA) which examines mobile security threats from around …
ThreatTrack 2.0 plugs malware holes in real-time
GFI Software launched GFI ThreatTrack 2.0, the latest version of the security intelligence solution that provides users with visibility into the threat landscape. It produces …
Featured news
Resources
Don't miss
- Logitech confirms data breach
- Five men admit helping North Korean IT workers infiltrate US companies
- The tech that turns supply chains from brittle to unbreakable
- Strix: Open-source AI agents for penetration testing
- Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts