Help Net Security
Zeus evolution: Geographical attack locations
Despite having been around for four years, Zeus continues to be a thorn in the side of the IT security industry and its business users, mainly because of its constantly …
Serious jump in new vulnerabilities exploitation
On a typical month, exploit activity falls between 30 percent and 40 percent, according to Fortinet. Half of new vulnerabilities rated as “critical” were targeted …
Panda Antivirus for Mac Corporate Edition released
Panda Security launched Antivirus for Mac Corporate Edition, a solution for companies operating with hybrid computing environments, delivering complete protection against all …
63.7% of organisations plan a cloud investment this year
Only 36.3% of organizations are not planning any cloud investment, suggesting that previous fears of moving into the cloud may have abated, according to Ipswitch. Cloud …
Cisco unveils security specialist training and certifications
Cisco introduced new Security Specialist certifications to recognize individuals who have attained specific competencies critical to meeting demand for network security skills …
VLC 1.1.7 fixes security issue
VideoLAN unveiled VLC 1.1.7, a security update on 1.1.6. When parsing an invalid MKV (Matroska or WebM) file, input validation are insufficient. If successful, a malicious …
IT governance and mobile technology
The mobile world is undergoing explosive growth. Luckily, enterprises are beginning to realize the potential gains and losses this technology offers, enabling them to act …
Cain & Abel 4.9.38 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Expanding phishing vector: Classified ads
The online classified advertisement services sector has been increasingly exploited as a phishing attack vector by ecrime gangs, a trend confirmed by the growth of attacks …
Free guide: Web application security
Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention …
Widespread “undelivered package” spam attack delivers Trojans
Cybercriminals are currently sending out the spam messages – which come attached with a malware infected .zip file – with titles such as “Post Express …
Governance has a central role in IT security
A major survey from ISACA confirms the central role that governance plays in information security within large organizations and stresses the fact that 95% of IT professionals …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations