Help Net Security
AV vendors detect on average 19% of malware attacks
Traditional AV vendors continue to lag behind online criminals when it comes to detecting and protecting against new and quickly evolving threats on the Internet, according to …
Paranoid workers access corporate data on vacation
With bags packed, flights booked and foreign currency in their pockets the workforce might be jetting off but they’re definitely not leaving the daily grind behind. …
How Web frameworks kill traditional security scanning
In this video from OWASP AppSec Research 2010, Christian Hang discusses how web frameworks kill your static security scans.
Zero day initiative program updated
HP announced an enhancement to the HP TippingPoint Zero Day Initiative (ZDI) that calls for the publishing of vulnerability advisories no later than six months after flaws are …
Large Zeus botnet used for financial fraud
Trusteer announced that it has uncovered a large Zeus version 2 botnet being used to conduct financial fraud in the UK which is operated and controlled from Eastern Europe. …
CIOs prioritizing personal mobile device security
With more than half of financial services enterprises already supporting personally-owned mobile devices, a significant challenge has been introduced to most firms’ …
Faster detection coming to Snort
Sourcefire will become the first security vendor to integrate Intel’s QuickAssist Pattern Matching Technology. Snort 2.9, now in beta, leverages the Intel QuickAssist …
Rapid7 launches NeXpose 4.9
Rapid7 announced NeXpose 4.9. Now, government agencies facing Federal Information Processing Standard (FIPS) 140-2 Certification requirements, and enterprises that adopt this …
Mobile devices: Greatest threat to confidential Information?
The use of wireless networks, typically less secure than wired networks, leaves information at greater risk for interception, according to ISACA. From smartphones to USB …
63% consider international cyber-espionage acceptable
Sophos published the mid-year 2010 Security Threat Report, revealing the findings of a survey into attitudes towards cyberwarfare and detailing other trends and developments …
Biometric authentication for iPhone apps
PerSay announced its VocalPassword functionality for iPhone, iPad, and iPod Touch applications. The new capability is poised to replace cumbersome login and strong …
Summer holiday security checklist
SecureWorks outlines its top ten tips for IT and security managers to minimize risk during the holiday season. 1. Hackers don’t go on holiday – Many frontline …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground