Help Net Security
10 steps to ensure users only access what they need
Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …
Stuxnet cousin able to attack industrial control systems
Today, extensive analysis on a new cyber espionage weapon dubbed “Gauss’ has been released, stating that the tool has capabilities to attack national critical …
Microsoft to release nine bulletins on Tuesday
For the second month running, Microsoft’s Patch Tuesday Advanced Notification includes nine bulletins. This month, five are rated “critical’ and four …
NIST updates guide for dealing with computer security incidents
The National Institute of Standards and Technology (NIST) has published the final version of its guide for managing computer security incidents. Based on best practices from …
Performance tuning Windows Server 2012
Microsoft released a comprehensive paper that describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the …
Insight on social software and big data analytics
Teradata and Mzinga announced the results of a recent industry survey exploring the use of social technologies and big data analytics in business. The survey’s primary …
ESET updates products for OS X Mountain Lion
ESET announced that ESET Cybersecurity for Mac and ESET NOD32 Antivirus Business Edition for Mac OS X have been updated to be fully compatible with OS X Mountain Lion. These …
CISSP Study Guide, 2nd Edition
The CISSP certification is a globally-recognized, vendor neutral exam for information security professionals. The newest edition of this study guide is aligned to cover all of …
BYOD increases costs for most organizations
The results of a study by Lieberman Software Corporation confirms that BYOD (bring your own device) increases costs to businesses. Respondents were asked if they believed …
Rapid7 Nexpose introduces IPv6 discovery and scanning capabilities
Rapid7 announced that the new version of its vulnerability management solution, Rapid7 Nexpose, introduces features for discovering and scanning IPv6 assets that organizations …
6+ million malware samples created in the last 3 months
In the second quarter of 2012 alone, more than six million new malware samples were created, a similar figure to the first quarter, according to PandaLabs. The average number …
Olympics and Android hit by malware and rogue apps
GFI Software released its report of the most prevalent threat detections encountered last month. In July, GFI threat researchers observed a number of malware attacks targeting …
Featured news
Resources
Don't miss
- Cisco fixes AsyncOS vulnerability exploited in zero-day attacks (CVE-2025-20393)
- Product showcase: Penetration test reporting with PentestPad
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses