Help Net Security
Week in review: Inside a CERT, hotel systems breach and DHS network security holes
Here’s an overview of some of last week’s most interesting news, articles and videos: Behind the scenes and inside workings of a CERT Brian Honan is the founder …
Rogue employees sell passport data of World Cup fans
Reports are coming in that the Information Commissioner’s Office has started investigating FIFA, the world football governing body, over allegations that details of …
Incentives and challenges for cyber security information sharing
The European Network and Information Security Agency (ENISA), launched a new report on barriers to and incentives for cyber security information sharing. It shows that the …
Be careful what you reveal online
In the video below, Trend Micro CTO Raimund Genes discusses how an attacker can use information from social networks such as LinkedIn and Facebook to hack into a corporate network.
Multiple vulnerabilities in Cisco Wireless LAN Controllers
Cisco WLCs and Cisco WiSMs are responsible for system-wide wireless LAN functions, such as security policies, intrusion prevention, RF management, quality of service, and …
How your identity could be stolen on Facebook
With its millions of users, the world’s most popular social network has become a perfect target for attackers exploiting such a dense concentration of potential victims. …
Tips for safer social networking
The popularity of social networking sites such as Facebook, Twitter and LinkedIn is continuing to grow dramatically, but not just with users. Cybercriminals increasingly are …
Android SMS Trojan delivered via SEO techniques
Android users searching for pornography on their smart phones could be in for a costly surprise. During the course of researching the origin for the first SMS Trojan for …
Apple iOS 4.1 fixes security issues
The iOS 4.1 Software Update is the first major update to iOS 4, bringing Game Center, new iTunes features, high dynamic range photography, and security updates to the iPhone. …
Security for Android applications
Arxan Technologies released EnsureIT for Android, a software protection product that secures mobile Android applications against reverse-engineering or tampering for …
Virtualization for Security
Virtualization is among the hottest topics in the IT world today. While the term itself can mean many different things in IT, most of the time it actually refers to so-called …
Trend Micro launches Titanium 2011 security software
Trend Micro released Titanium Security 2011 that utilizes a cloud-client strategy that combines cloud-based web, email, and file reputation services with Trend Micro’s …
Featured news
Resources
Don't miss
- Cisco fixes AsyncOS vulnerability exploited in zero-day attacks (CVE-2025-20393)
- Product showcase: Penetration test reporting with PentestPad
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses