Help Net Security
What’s in your daily slice of spam?
Just as the original spam – the tinned meat of 50 years ago – prompted people to wonder just what it contained, so too does the spam of the internet age. …
Programming iOS 5, 2nd Edition
Get a solid grounding in the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition of Programming iOS …
Week in review: Hotmail 0-day bug, CISPA, and securing embedded devices
Here’s an overview of some of last week’s most interesting news, podcasts and articles: SpyEye botnet for sale at bottom price A drop in the price asked for the …
Mobile malware increasingly delivered via social networks
The growing use of mobile devices to connect with social networks is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices …
PayPal no longer the most phished brand
A new phishing survey released by the Anti-Phishing Working Group (APWG) reveals that in the second half of 2011, China’s Taobao.com became the world’s most …
HITRUST establishes incident response center for healthcare Industry
In light of growing threats posed by cyber attacks targeted at healthcare organizations, the Health Information Trust Alliance (HITRUST) has established the HITRUST …
Web and content filtering appliances by Bloxx
Bloxx announced the release of the Bloxx Secure Web Gateway (SWG), an appliance that combines the company’s dynamic real-time content analysis and classification engine, …
Anomaly detection solution for mobile banking
Guardian Analytics announced FraudMAP Mobile, the company’s latest fraud prevention innovation, purpose-built to identify suspicious mobile banking activity. The …
Cisco CCNP Service Provider certification announced
Cisco announced the availability of its Cisco CCNP Service Provider certification developed to validate the skills and knowledge of network engineers to deploy and optimize a …
A security scanner for SAP 2.0
ERPScan has released ERPScan Security Scanner for SAP 2.0 – a complex solution to continuously monitor all areas of SAP security, from vulnerability assessment and …
Centralized management for self-encrypting drives
Credant Technologies announced Credant Enterprise Edition 7.3, which includes improved features and functionality to help organizations meet their growing needs for protecting …
36 credit card fraud websites taken down
36 website domains, used to sell compromised card data, have been taken down following a day of action on Wednesday to target online criminals by SOCA working with the FBI and …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine