Help Net Security
Critical vulnerabilities in popular DDoS toolkit exposed
Prolexic Technologies exposed weaknesses in the command and control (C&C) architecture of the Dirt Jumper DDoS Toolkit family that could neutralize would-be attackers. …
Organizations lack protocols to protect data in the cloud
While sixty-two percent of survey respondents are leveraging the cloud and/or virtualization, only 33 percent of these organizations test data recovery plans regularly to …
Huge jump in number of fines for data breaches
The Information Commissioner’s Office (ICO) has revealed a huge increase in the number of penalties handed out for organisations in breach of the Data Protection Act. …
Cyber-Ark enhances security of files in-transit
Cyber-Ark Software announced version 7 of its Sensitive Information Management Suite to support secure file exchange environments. The suite isolates sensitive data sent over …
Microsoft releases nine comprehensive security bulletins
Microsoft released nine comprehensive security bulletins as part of its regular update cycle. At the top of the Microsoft list is another MSCOMCTL related bug. Last patched in …
BackTrack 5 R3 released
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
Imation updates line of hardware encrypted USB hard drives
Imation announced the expansion of its secure USB hard drive line with capacities of up to 1 terabyte (TB), optional biometric fingerprint authentication, and a set of options …
BYOD reality: Missing mobile device usage policies
Gone are the days when employees only used a company-issued phone or laptop for work. Today, employees bring personal smartphones and tablets to the office and often have …
Citadel Trojan targets airport employees with VPN attack
Trusteer have recently discovered a sophisticated Man in the Browser (MitB) enterprise attack that targets VPN users at a major international airport hub. Using the Citadel …
Sophos helps businesses embrace BYOD
Sophos announced the latest version of its mobile device management (MDM) solution, Sophos Mobile Control 2.5. With an updated web-based administrative console and new feature …
Tips for college students to deter identity theft
Research from Javelin Research & Strategy identifies 18-24 year olds as consumers who are most likely to engage in risky electronic behavior. From public Wi-Fi through …
Behavior-based fraud prevention for ACH transactions
Guardian Analytics announced FraudMAP ACH. Using the same behavior-based anomaly detection technology proven to prevent fraud at hundreds of banks and credit unions in the …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance