Help Net Security
Virtualization critical for disaster recovery
A BUMI survey, which polled CEOs, business owners and IT professionals at small- to mid-sized firms, found that 98 percent of respondents felt that more than one day to …
FIPS-validated mobile VPN for iPhone and iPad
Columbitech announced the availability of the enterprise-grade mVPN Secure Browser 5.0, which supports the iPhone, iPad and iPod Touch. The browser provides secure access to …
Windows 8 marks the beginning of the WinRT era
Windows 8 marks the beginning of the new WinRT (Windows Runtime) computing era and the beginning of the end of the WinNT era, according to Gartner. The combination of the …
Microsoft survey exposes online bullying threat
More than half (54 percent) of children around the world worry about being bullied online, according to a new global survey released today by Microsoft. Conducted in 25 …
Splunk App for Active Directory released
Splunk announced the Splunk App for Active Directory which helps enable organizations to avoid service outages and provides proactive management and compliance reporting of …
Bitdefender unveils new generation of products
Bitdefender launched Bitdefender 2013, improving and adding a whole arsenal of features to keep users safe. Bitdefender Safepay brings online banking and shopping to a whole …
Zeus malware strain infecting 1 in 50 PCs
ThreatMetrix Labs came across a new variant of the P2P version of the Zeus Trojan. One of the main changes to this variant is the way it encrypts its configuration file …
DroidSheep: Android tool for session hijacking
DroidSheep is a simple Android tool for web session hijacking (sidejacking). It listens for HTTP packets sent via a wireless (802.11) network connection and extracts the …
MI5 describes astonishing level of cyber attacks
MI5 has admitted that it is working to counter astonishing levels of cyber-attacks on UK industry. Head of MI5, Jonathan Evans, commented that vulnerabilities on the internet …
Video: Attacking XML preprocessing
Documenting more than a year of research in XML technologies, this talk by Nicolas Grégoire at Hack in The Box 2012 Amsterdam details security implications of the XML format …
Network Forensics: Tracking Hackers Through Cyberspace
Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from …
70% of teens hide their online behavior
When it comes to using the Internet, teens are not only engaging in risky behaviors, but how they are hiding it from their parents, many of whom don’t realize they are …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits