Help Net Security
Most businesses vulnerable to cache poisoning attacks
While DNSSEC adoption percentages appear to have increased dramatically by 340 percent this year, the actual number of zones that have been signed is very small: .02 percent, …
Growth in social networking, mobile and infrastructure attacks
IID released its list of the top enterprise security trends for 2011. Some specific areas that will have significant spikes in attacks are social networking, mobile, and …
Juniper Networks acquires Altor Networks
Juniper Networks has acquired Altor Networks, a provider of virtualization security technology that enables organizations to secure the virtualized world. Under the terms of …
How new Facebook user profiles impact privacy
Facebook today announced its New Profile, designed to help users share their experiences, discover common interests and highlight meaningful relationships. The service will be …
Dropbox 1.0.0 RC: Selective sync, bug fixes and improvements
The popular online backup, file sync and sharing service Dropbox released version 1.0.0 RC of their desktop client. Here’s what has been fixed since 0.8.114: Stop the …
Amazon launches new DNS service in the cloud
Amazon Web Services announced Route 53, a DNS web service giving a way to route Internet traffic to web applications by translating human readable names into numeric IP …
Federated voice biometric database to secure and authenticate e-money
Voice Commerce launched KYC Secure, a federated database developed to secure and authenticate a consumer’s identity over their mobile phone. The first regulated mobile …
Week in review: WikiLeaks developments, rich scammers and ATM infections
Here’s an overview of some of last week’s most interesting news, articles and interviews: Release of diplomatic cables reveals Aurora attacks instigator Among the …
Splunk 4.1.6 brings numerous fixes
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …
Twitter accounts spreading malicious code
Cybercriminals are exploiting Twitter to spread malware using festive-themed messages, according to PandaLabs. Using methods akin to black hat SEO techniques, hackers are …
IBM improves software security analysis
IBM announced new software and analysis capabilities that provide a more efficient and accurate way to design and manage secure applications. By consolidating software …
New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade