Help Net Security
Facebook scammers exploit death of Steve Jobs
PandaLabs detected a malicious link on Facebook that was being used to exploit the news of the death of Apple co-founder Steve Jobs. Just a few hours after Steve Jobs’ …
The state of hacked accounts
Most users get hacked at high rates even when they do not think they are engaging in risky behavior, with 62% unaware of how their accounts had been compromised, according to …
Back to the future: Why IT managers should care about firewall management
A number of classic scenes in film and literature involved a group approaching a walled city or castle only to be stopped by a gatekeeper and asked, “Halt, who goes …
ExploitHub offers cash for exploits
ExploitHub, the marketplace for penetration testers, is issuing a bounty for exploits developed against 12 high-value vulnerabilities (CVEs). Security researchers who submit …
Malware attacks up due to social media
63 percent of more than 4,000 respondents in a new Ponemon Institute survey said that social media in the workplace represents a serious security risk — yet only 29 percent …
Verizon Business data breach investigations report 2011: 8 days a week
What can be learned from the investigation into successful data breaches? What are the latest trends and techniques used by attackers? Get a front row seat at the breach cases …
Oracle Public Cloud released
Oracle CEO Larry Ellison announced the Oracle Public Cloud, a set of integrated services that provide customers with subscription-based, self-service access to Oracle Fusion …
GFI VIPRE Antivirus Business 5.0 released
GFI Software launched GFI VIPRE Antivirus Business 5.0 and GFI VIPRE Business Premium 5.0, the latest evolutions of the company’s flagship antivirus solutions. GFI has …
Check Point stops bot attacks
Check Point announced a new Anti-Bot Software Blade that protects against bots and APTs (Advance Persistent Threats). Check Point helps customers discover bots and prevent …
Modular wireless switch for high-performance networks
Xirrus launched the XR-series Wireless Arrays, the first modular, chassis-based wireless switch portfolio – providing modularity to protect network investments as …
Secure data encryption tunneling for Apple iOS
WatchGuard unveiled their new security technology designed for Apple iOS-enabled devices. Mobile users often need to connect to corporate resources from high-risk locations, …
SpyEye Trojan hijacks mobile SMS security for online fraud
A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act