Help Net Security
Georbot information stealing Trojan uncovered
ESET revealed its analysis of Georbot, an information stealing Trojan and botnet spreading in the country of Georgia. Earlier this year ESET’s global research team …
Mousetrap Trojan steals money by chain reaction
Catalin Cosoi, Chief Security Researcher at Bitdefender warns of a new Trojan that robs your bank account. The new Mousetrap campaign starts with a Java applet that has been …
Mobile forensics and cloud security at SANS Secure Europe 2012
SANS Secure Europe 2012, one of the region’s largest infosec training events will be returning to Amsterdam from 5th to 19th of May with its largest roster of courses …
Risk across the phases of application security
A new Ponemon Institute study surveyed more than 800 IT Security and Development professionals from enterprise organizations to understand the perceptions both groups have …
Tips for backups in virtual environments
With the rate of virtualized servers being added to IT environments, organizations are facing new challenges in how to adequately protect data and ensure its recoverability …
GSM cracking revelations are profound
Commenting on news reports that an Indian company has revealed it can tumble and clone the credentials of mobile phone SIM cards over the airwaves – apparently because …
Network intrusion detection for Amazon Web Services
Alert Logic announced the availability of Alert Logic Threat Manager and ActiveWatch for Amazon Web Services (AWS). AWS customers using Amazon EC2 interested in an added layer …
Smartphone security checklist
While smartphones can make a significant and positive impact on those who embrace the technology, conversely the technology can wreak havoc on its users if they are …
Confidential documents are leaving the workplace
90% of Americans believe people remove confidential documents from the workplace, even though most adults (79%) say taking confidential files outside the office is grounds for …
Cisco goes beyond BYOD
Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco Connected …
Protect data and automate log management
Released today, WhatsUp Log Management 10.1.1 boasts pre-built, out-of-the-box reports, focused on complying with European-specific data protection regulations. The reports …
On-demand cloud identity management
Ping Identity unveiled PingOne, a multiplexed identity switch in the cloud. One connection to PingOne provides businesses the convenience of Tier 1 Single Sign-On (SSO) access …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility