Help Net Security
Avast 2015 identifies vulnerable home routers
Avast Software launched Avast 2015, available in four consumer variations: Avast Free Antivirus, Avast Pro Antivirus, Avast Internet Security, and Avast Premier. All versions …
Think before you share that file
It’s hard to read through the news nowadays without stumbling upon some type of data breach or leak. Recently, Apple’s iCloud service has been in the limelight, …
Koler worm spreads via SMS, holds phones for ransom
A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid. AdaptiveMobile detected the …
60% of Android attacks use financial malware
Malicious programs targeting Android-based devices in order to steal money were used in 60 percent of attempted attacks registered by Kaspersky Lab security products, …
Cloud adoption trends in European organizations
In Europe, the number of cloud services in use by the average company increased 23 percent, rising from 588 in Q1 to 724 in Q3. However, not all of these services are ready …
What all major brands share in common with the Snappening
By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet …
Small healthcare facilities unprepared for a data breach
While healthcare breaches are on the rise, most small facilities feel that their systems adequately limit the risk of a data breach despite one in three facilities spending …
The Software Assurance Marketplace: A response to a challenging problem
With the steady proliferation of wearable devices and the emergence of the Internet of Things, everyone and everything will eventually be connected by some piece of software. …
Infographic: A brief history of malware
From simple disk-to-disk attacks in the 80s to email viruses in the modern day, malware is here to stay. This ESET infographic offers you insight about the origins and …
Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild
Here’s an overview of some of last week’s most interesting news and articles: Identifying deceptive behavior in user-generated content In this interview, JT Buser, …
Targeted attack protection via network topology alteration
When it comes to targeted attacks, attackers are not omniscient. They need to gather information in the early stages to know the target they may gather information from …
The impact of disconnected security strategies
39% of organizations’ IT departments are spending too much time managing their security network and manually tackling threats, according to McAfee. Almost a third of IT …
Featured news
Sponsored
Don't miss
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates