Help Net Security
Hardware encrypted RAID tower
Ciphertex Data Security introduced the CX-RANGER/E, a portable encrypted RAID system with AES 256-bit hardware-based encryption and up to 5 Terabytes of storage capacity. It …
Increase in Halloween malware attacks
There’s an increase in the number of Trojans circulating in the pre-Halloween period this year, according to GFI Software. Eight of the top 10 threat detections …
Automated data protection for private clouds
EMC announced their new Data Protection Advisor management software that automatically monitors, analyzes, provides alerts and reports on all aspects of the protection status …
Cybercriminals aggressively recruiting money mules
Money mules have been aggressively recruited this year to help cyber criminals launder money, according to Fortinet. A recent example of this is the worldwide prosecutions of …
Boonana Trojan for Mac OS X spreads via social media
SecureMac has discovered a new Trojan horse in the wild that affects Mac OS X, including Snow Leopard (OS X 10.6). The Trojan horse, Trojan.osx.boonana.a, is spreading through …
Computer pranks that simulate Trojan infections are invading the Web
As Halloween approaches, applications, fake websites, spam and Trojans all put on a disguise to try to trick users. PandaLabs has been detecting attacks like these since …
Most Americans support an Internet kill switch
Sixty-one percent of Americans said the President should have the ability to shut down portions of the Internet in the event of a coordinated malicious cyber attack, according …
CloudAudit joins the Cloud Security Alliance
The Cloud Security Alliance (CSA) announced that CloudAudit has become an official project of the CSA, with the joint mission of promoting the use of best practices for …
.com is the most dangerous domain
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to McAfee’s “Mapping the Mal Web” report released today. Fifty-six …
Breaking web browsers
In the video below, Jeremiah Grossman, the founder and CTO of WhiteHat Security, talks about breaking web security. The video was recorded at the OWASP AppSec USA 2010 conference.
80% of firms don’t know who should secure cloud data
The cloud is still akin to the Wild West when it comes to the security of the data hosted there, according to Courion. In fact, 1 in 7 companies admit that they know there are …
One-touch secure access to corporate data
Check Point announced its new Mobile Access Software Blade that delivers fast and secure access to corporate email, data and business applications from mobile devices. It …
Featured news
Resources
Don't miss
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)