Help Net Security
SCADA SIEM for critical infrastructure protection
AlienVault released its ICS SIEM, a family of purpose-built appliances which provide a platform for security and compliance management across industrial process control …
Spam not the problem it once was
Email spam is still an everyday occurrence, but not the nuisance it once was, according to Avira. Nearly half of all end-users are satisfied with the anti-spam filters on …
How banks use Twitter to combat fraud
With phishing attacks hurting the credibility of email communications, forward thinking banks are turning to social media as the best channel to warn customers of scams and …
The evolution of traditional desktops into personal clouds
As users go virtual in all aspects of their life, the notion of doing all their work on a single traditional desktop in one physical location is rapidly evolving. …
IBM WebSphere Portal XSS vulnerability
A vulnerability has been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. Certain …
Spammers establish their own fake URL-shortening services
For the first time ever, spammers are establishing their own their own fake URL-shortening services to perform URL redirection, according to Symantec. This new spamming …
Cybercrime statistics show widespread phishing problem
The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …
The rise of layered fraud prevention
By 2014, 15 percent of enterprises will adopt layered fraud prevention techniques for their internal systems to compensate for weaknesses inherent in using only authentication …
Mobile users: Risky behavior and weak security
Researchers found that while an increasing number of consumers use mobile devices for both business and personal activities, large numbers are not familiar with their …
iPhone hardware encryption investigated
Users of Apple iPhone devices accumulate huge amounts of highly sensitive information stored in their smartphones. Historical geolocation data, viewed Google maps and routes, …
phpMyAdmin redirection weakness and script insertion vulnerability
A weakness and a vulnerability have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to …
GFI LANguard 2011 released
GFI Software launched GFI LANguard 2011, the latest version of the network vulnerability scanning and patch management solution. GFI LANguard 2011 is the first network …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform