Help Net Security
Attackers exploiting unpatched vulnerability in Internet Explorer
Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. There are active attacks attempting to use this vulnerability against Internet …
Top 3 tips for virtual infrastructure protection
Flexible infrastructure If you already have a disaster recovery solution in place make sure that it is flexible enough to be used for physical and virtual server platforms. …
Mobile security market to exceed $4 billion by 2014
Strong enterprise demand for data security is driving rapid growth in mobile device management services. According to a study by ABI Research, the number of smartphones …
Top 10 information security threats for 2010
“The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they’ll be facing in …
Continuing evolution of Internet threats
Spammers continue to be cutting-edge marketers, this time taking advantage of the reputations of global brands, such as UPS, DHL and Facebook, to prompt opening of emails. …
Chinese attacks gear Google to focus on security and privacy
Google acted correctly in ending self-censorship of its Chinese search engine, Google.cn, but the cyber attacks that prompted the decision demonstrate the company must give …
New CRISC certification for risk professionals
The Certified in Risk and Information Systems Control (CRISC) designation from ISACA is for IT professionals who identify and manage risks through the development, …
Adobe fixes critical vulnerabilities in Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.2 and Acrobat 9.2 for Windows, Macintosh and UNIX, and Adobe Reader 8.1.7 and Acrobat 8.1.7 for Windows and …
Hackers to target personal data with custom malware
AppRiver released its year-end spam and virus report. Phishing remained a consistent threat with several campaigns targeting social networking sites and mimicking major banks, …
Only 27% of organizations use encryption
According to a Check Point survey of 224 IT and security administrators, over 40% of businesses in the last year have more remote users connecting to the corporate network …
What you need to know about backing up virtual machines
The benefits of using virtualization to consolidate data center infrastructure and provide a more flexible platform for moving, provisioning and backing up workloads are …
Second wave of electronic IDs in Europe
With the recent announcement that a national electronic ID (e-ID) project will be rolled out in early 2011, Poland injects optimism for further momentum in e-ID rollouts in …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul