Help Net Security
Critical data exchange in the cloud
The pace of business today requires that critical information can be accessed anywhere, anytime. Furthermore, this sharing of information often happens amongst both internal …
Week in review: Facebook scams, OddJob Trojan and corporate espionage via social networks
Here’s an overview of some of last week’s most interesting news and articles: New types of cookies raise online privacy concerns The advertising industry has led …
Social media authenticity, privacy and security
Panda Security is providing guidance on ways to safely and securely integrate social media strategies into an SMB. Panda Security discovered that 78 percent use social …
Going “eye to eye” with network security threats
One of the ironies of our increasingly technology-dependent society is that you need an ever increasing amount of technology to address the failings or risks of the technology …
Failure to invest in secure software a major risk
Failure to take software security seriously is putting organizations, brands and people at risk, according to a report by Creative Intellect Consulting. Key highlights from …
Integrated single sign-on and authentication to cloud and SaaS
SafeNet announced Authentication Manager (SAM) 8.0. The unified enterprise platform combines strong authentication and identity federation to help organizations centrally …
Apple releases developer preview of Mac OS X Lion
Apple released a developer preview of Mac OS X Lion, which takes some of the best ideas from iPad and brings them back to the Mac. The Lion preview is available to Mac …
Malware-driven pervasive memory scraping
Reports are coming in of a new trend in hacking techniques. Known as “pervasive memory scraping,’ the technique relies on the fact that certain areas of Windows …
Spyware compromises 150,000+ Symbian devices
A new variant of spyware “Spy.Felxispy” on Symbian devices causing privacy leakage has recently been captured by the National Computer Virus Emergency Response …
41% of organizations not aware of security risks
41 percent of organizations are not well aware of or protected against IT security risks, according to McAfee. Another 40 percent are not completely confident they can …
BIND Denial of Service vulnerability
A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a Denial of Service, according to Secunia. When an authoritative server …
A single click can open door to cybercrime
Blue Coat Systems unveiled their 2011 security report that examines Web behavior and the malware to which users are most frequently exposed. The report analyzes Web requests …
Featured news
Resources
Don't miss
- Can your earbuds recognize you? Researchers are working on it
- Dependency-Track: Open-source component analysis platform
- DDoS, data theft, and malware are storming the gaming industry
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer