Help Net Security
SpyEye Trojan post transaction fraud schemes attack banks
Many of us tend to spend a little more than we intend during the holiday season and, with all the transactions hitting our accounts, it can be hard to keep track. During the …
Israeli credit card hack creates more opportunities
In a recent data breach incident, a Saudi hacker defaced a prominent sports news web site in Israel and linked its front page to a file exposing the details of many credit …
Teach Yourself TCP/IP in 24 Hours
In just 24 sessions of one hour or less, you’ll discover how to implement, monitor, and manage a TCP/IP network – even the latest cloud-based and IPv6 networks. …
HID Global acquires EasyLobby
HID Global has acquired EasyLobby, a provider of visitor management solutions. The company’s product suite provides visitor registration, tracking, reporting, badge …
Nmap introduces 51 new scripts
Nmap is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network …
Securing Android for the enterprise
The numbers speak for themselves – Android’s share of the worldwide smartphone market is 52.5 percent, more than double compared to a year ago, according to recent …
Tips to manage top IT trends
ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology …
Single packet authorization and port knocking
fwknop implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports …
Cloud Computing: Automating the Virtualized Data Center
Cloud computing will revolutionize the way IT resources are deployed, configured, and managed for years to come. Service providers and customers each stand to realize …
Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks
Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …
Microsoft releases MS11-100 for ASP.NET DoS attack
Today Microsoft released a security bulletin addressing a flaw in ASP.NET that was disclosed early morning yesterday at the Chaos Communication Congress (CCC) in Berlin. …
Analysis of Facebook attacks
Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation