Help Net Security
Week in review: Study of hacker forums, creating effective CAPTCHAs, and trust relocated for yet another CA
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Irresponsible IT disposal methods Although data security is the …
Focusing on new technologies instead of security threats
In the rush to utilize new technologies and move into the increasingly borderless world of cloud computing, mobile devices and social media, a growing gap is developing …
Most firms don’t coordinate security planning
Despite the potentially crippling impact of security events on corporate performance, many executives report that their security function is not well coordinated with …
New analytics advance IBM security intelligence portfolio
IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …
IT Operations Analyzer gets expanded monitoring capabilities
Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …
Unique malware URLs increased 89 percent
Websites loaded with malware increased a massive 89 percent in the third quarter compared to Q2 2011. According to an IID report, the most impersonated organizations include …
Five million new malware samples
In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …
First joint EU-US cyber security exercise
The first joint cyber security exercise between the European Union and United States is being held today in Brussels, with the support of the EU’s Network and …
Managing firewall risks in the cloud
67 percent of IT security respondents in a Ponemon Institute study, report that their organization is very vulnerable or vulnerable because cloud ports and firewalls are not …
Registry Decoder: Digital registry forensics
Registry Decoder is a free and open source tool for the acquisition, analysis, and reporting of registry contents. It comes with an online acquisition component and an offline …
Norton updates Tablet Security and Mobile Security
Symantec announced Norton Tablet Security and new updates for Norton Mobile Security, including a new “Scream” feature that helps users find a lost or stolen phone …
The value of digital content
Although 51% of Americans have experienced a computer crash where they lost all of their digital files, more than one-third (39%) admit they have never backed up their …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground