Help Net Security
Week in review: Study of hacker forums, creating effective CAPTCHAs, and trust relocated for yet another CA
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Irresponsible IT disposal methods Although data security is the …
Focusing on new technologies instead of security threats
In the rush to utilize new technologies and move into the increasingly borderless world of cloud computing, mobile devices and social media, a growing gap is developing …
Most firms don’t coordinate security planning
Despite the potentially crippling impact of security events on corporate performance, many executives report that their security function is not well coordinated with …
New analytics advance IBM security intelligence portfolio
IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …
IT Operations Analyzer gets expanded monitoring capabilities
Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …
Unique malware URLs increased 89 percent
Websites loaded with malware increased a massive 89 percent in the third quarter compared to Q2 2011. According to an IID report, the most impersonated organizations include …
Five million new malware samples
In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …
First joint EU-US cyber security exercise
The first joint cyber security exercise between the European Union and United States is being held today in Brussels, with the support of the EU’s Network and …
Managing firewall risks in the cloud
67 percent of IT security respondents in a Ponemon Institute study, report that their organization is very vulnerable or vulnerable because cloud ports and firewalls are not …
Registry Decoder: Digital registry forensics
Registry Decoder is a free and open source tool for the acquisition, analysis, and reporting of registry contents. It comes with an online acquisition component and an offline …
Norton updates Tablet Security and Mobile Security
Symantec announced Norton Tablet Security and new updates for Norton Mobile Security, including a new “Scream” feature that helps users find a lost or stolen phone …
The value of digital content
Although 51% of Americans have experienced a computer crash where they lost all of their digital files, more than one-third (39%) admit they have never backed up their …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation