Please turn on your JavaScript for this page to function normally.
The state of hacked accounts

Most users get hacked at high rates even when they do not think they are engaging in risky behavior, with 62% unaware of how their accounts had been compromised, according to …

ExploitHub offers cash for exploits

ExploitHub, the marketplace for penetration testers, is issuing a bounty for exploits developed against 12 high-value vulnerabilities (CVEs). Security researchers who submit …

Malware attacks up due to social media

63 percent of more than 4,000 respondents in a new Ponemon Institute survey said that social media in the workplace represents a serious security risk — yet only 29 percent …

Oracle Public Cloud released

Oracle CEO Larry Ellison announced the Oracle Public Cloud, a set of integrated services that provide customers with subscription-based, self-service access to Oracle Fusion …

Photos: The look and feel of Virus Bulletin 2011

Help Net Security is attending the Virus Bulletin 2011 conference in Barcelona this week. Here’s an overview of the event in photos. DC Bob Burls of UK’s Police …

GFI VIPRE Antivirus Business 5.0 released

GFI Software launched GFI VIPRE Antivirus Business 5.0 and GFI VIPRE Business Premium 5.0, the latest evolutions of the company’s flagship antivirus solutions. GFI has …

Check Point stops bot attacks

Check Point announced a new Anti-Bot Software Blade that protects against bots and APTs (Advance Persistent Threats). Check Point helps customers discover bots and prevent …

Modular wireless switch for high-performance networks

Xirrus launched the XR-series Wireless Arrays, the first modular, chassis-based wireless switch portfolio – providing modularity to protect network investments as …

Secure data encryption tunneling for Apple iOS

WatchGuard unveiled their new security technology designed for Apple iOS-enabled devices. Mobile users often need to connect to corporate resources from high-risk locations, …

SpyEye Trojan hijacks mobile SMS security for online fraud

A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …

Wi-Fi users live in a false sense of security

Wi-Fi users in the U.S. are confident that they are taking the right steps to protect themselves when using Wi-Fi devices. In fact, 97 percent of Wi-Fi users recently surveyed …

Best practices for fighting credit card theft

3Delta Systems issued a set of business best practices for protecting customer credit card account information and minimizing corporate exposure to online payment scams. …

Don't miss

Cybersecurity news