Help Net Security
Cheap Zeus source code will generate more Trojan variants
Barely two months after cybercriminals put the source code of Zeus up for sale at $100,000, reports are now coming in that the source code is being offered at bargain basement …
Millions in privacy violations wake-up the healthcare industry
What can healthcare organizations learn from the multi- million dollar penalties recently issued by the Department of Health and Human Services Office for Civil Rights (OCR) …
MacScan 2.8 released
SecureMac released MacScan 2.8, the latest version of its anti-spyware, privacy and security software for Mac OS X. Detect, isolate, and remove spyware as well as clean up …
Secunia joins the Information Security Forum
Secunia has become a member of the Information Security Forum (ISF), an independent authority on best practice in the field of information risk management. Secunia thereby …
Data breach mistakes feared more than attackers
Seventy percent of compliance professionals feel that their organizations are well or very well prepared to fend off malicious hacker attacks, however, their confidence wanes …
Top cybercrime weapon: Web exploit toolkits
HP identified a significant increase in the volume of organized cybercrime targeting data centers and networks, which can lead to financial and data loss. While there were …
Automated security analysis
Security would be easy if it wasn’t for all the changes, as any IT manager will tell you. Other sectors of IT, such as CRM or ERP, can continue to function efficiently …
EMC acquires NetWitness
EMC has acquired NetWitness, a privately-held provider of network security analysis solutions. NetWitness’ technologies provide network visibility, enabling security …
Webroot Mobile Security for Android released
Webroot released Mobile Security for Android which protects users as they browse, text, and download apps on Android devices. A basic version, offering more limited features, …
Multiple vulnerabilities in IBM Tivoli Directory Server
Multiple vulnerabilities have been reported in IBM Tivoli Directory Server, which can be exploited by malicious users to disclose sensitive information and by malicious people …
Week in review: New cybercrime currency, massive SQL injection attack and Facebook battling scammers
Here’s an overview of some of last week’s most interesting news, videoas and articles: Intellectual capital is the new cybercrime currency Cybercriminals …
Pharmaceutical spam and mobile threats dominate
Wannabe cybercriminals were able to execute attacks with impunity and relative ease thanks to toolkits, pre-written software programs designed to steal information, rendering …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations