Help Net Security
Cybercriminals offer complex infection services
Services for fraudsters utilizing malware are not new – AV checkers, malware encryption and malware infection services have existed in the criminal underground market …
Cloud computing traffic to grow 12-fold by 2015
Cisco estimates global cloud computing traffic will grow 12-fold from 130 exabytes to reach a total of 1.6 zettabytes annually by 2015, a 66 percent compound annual growth …
Centralized management of Mac users
Centrify announced a new release of Centrify DirectControl for Mac OS X, a solution for Active Directory-based authentication, single sign-on, smartcard and group policy …
New release of WatchGuard XTM OS
WatchGuard Technologies unveiled their latest security operating system for the XTM line of unified threat management appliances. One of the new features includes the ability …
RIM to manage Android and iOS devices
RIM introduced BlackBerry Mobile Fusion, an enterprise mobility solution that will simplify the management of smartphones and tablets running BlackBerry, Android and iOS …
Cyber security trends for financial services in 2012
Booz Allen Hamilton today cited increased cyber threats to senior executives, the impact of organized crime and mobile device security as among the top 10 financial services …
NetWars to test the skills of infosec professionals
At SANS London 2011, Europe’s largest IT security training event, NetWars will be launched for the first time in the UK. NetWars participants compete in a mock …
Significant drop in FakeAV
The trend in malicious software and attempted cyber crime is up but some of the most popular and visible malware is trending down. According to lab results from Norman, a …
New mobile security challenges
For years, analysts have predicted most Internet users would end up with an all-in-one device that replaces all others. However, as new devices emerge, users are often …
Feds seize 150 domains for selling counterfeit goods
Seizure orders have been executed against 150 domain names of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works. The …
Schneider electric products multiple vulnerabilities
Multiple vulnerabilities have been reported in multiple Schneider Electric products, which can be exploited by malicious people to conduct cross-site scripting attacks, …
Twitter acquires Moxie Marlinspike’s startup
Well-known security researcher and speaker Moxie Marlinspike’s startup Whisper Systems has been acquired by Twitter. The official announcement says: The Whisper Systems …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)