Help Net Security
Malware sophistication worries IT leaders
More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent …
BYOD security for cloud Wi-Fi access
AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, …
China escalating Tibetan cold war into cyberspace
AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a …
Machine Learning for Hackers
If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …
Microsoft patches seven distinct vulnerabilities
We have a total of six bulletins from Microsoft this month, addressing seven distinct vulnerabilities. It’s a pretty light month, but all of your focus should be on …
Apple fixes 83 vulnerabilities in Safari
Apple issued a patch for Safari, fixing 83 vulnerabilities, 72 of which were rated critical. Since Safari and Chrome both use WebKit, the open-source browser engine, it allows …
Data protection risks on mobile devices
An increasing number of professionals (80 percent) work remotely and rely on personal devices such as smartphones (63 percent), iPads (30 percent) and laptops (80 percent) to …
Dell to acquire SonicWALL
Dell has signed a definitive agreement to acquire SonicWALL, a provider in advanced network security and data protection. SonicWALL expands Dell’s growing security …
Eliminating the need for multiple passwords
OneID announced the developer release of its service that eliminates the need for multiple usernames and passwords. Using the OneID service, consumers can sign in to websites …
Big gaps in backup plans
Small businesses are using a variety of technologies to back up data including some antiquated methods that leave the backup process incomplete and susceptible to information …
LogRhythm and Solera Networks announce a technology partnership
LogRhythm and Solera Networks announced a technology partnership to provide customers with network visibility, security and situational awareness by combining …
New online banking fraud schemes target mobile users
Trusteer uncovered two online banking fraud schemes designed to defeat one time password (OTP) authorization systems used by many banks. Unlike a previous attack Trusteer …
Featured news
Resources
Don't miss
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”