Help Net Security
Cyber espionage campaign in the Middle East
Kaspersky Lab researchers announced the results of a joint-investigation with Seculert regarding Madi, an active cyber-espionage campaign targeting victims in the Middle East. …
Most companies block cloud services
While 80 percent of companies do not allow their employees to use cloud based file synchronization services, 70 percent of companies would use these services if they were as …
Oracle releases 87 security fixes
The Oracle Critical Patch Update (CPU) Advisory for July 2012 contains 87 security fixes for various products across their portfolio. This advisory is a bit of déjà vu …
Rapid password cracking using Pico FPGA-based hardware
ElcomSoft updated two password recovery tools, employing Pico FPGA-based hardware to greatly accelerate the recovery of passwords. Users of Elcomsoft Phone Password Breaker …
MPs call for cyber war on Britain’s cyber enemies
Britain’s security and intelligence agencies have been urged by MPs to engage in cyber attacks against enemy states in a report released by The Intelligence and Security …
Real-time IP address blocking of DDoS attacks
Corero Network Security is extending its capabilities with the launch of ReputationWatch. It will identify in real-time known malicious entities and block access to …
IPv6 and click fraud
The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers …
Panda Cloud Antivirus 2.0 released
Panda Security launched Panda Cloud Antivirus 2.0 for both its Free and Pro editions. The new version is fully compatible with Windows 8 Release Preview and incorporates a new …
Send messages with file attachments in a secure environment
TigerText introduced the ability to send file attachments today through an API integration with Dropbox. TigerText users will now be able to securely and instantly send PDF, …
Sophos delivers complete security in a box
Sophos announced Sophos UTM 9, specifically designed to integrate gateway security and endpoint security in a single hardware or virtual box. It provides complete security …
Blue Coat delivers mobile application controls
Blue Coat introduced mobile application controls that close the security gap created by unsanctioned mobile applications on the corporate network. The growth in bring your own …
Check Point simplifies security for private clouds
Check Point introduced Check Point Virtual Systems, that allow customers to secure multiple network segments by selecting any combination of Check Point software blade …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests