Please turn on your JavaScript for this page to function normally.
Photos: The look and feel of SecurityByte 2011, part 2

Help Net Security attended this India’s largest information security conference in Bangalore – SecurityByte 2011. The first photo gallery is here. A group photo of …

Multi-layer fraud prevention from IronKey

IronKey introduced the next generation of online banking security: an integrated platform of multiple security controls. This approach reduces the risk of online banking fraud …

SplashID Enterprise: Centralized control of password administration

SplashData announced SplashID Enterprise 2.0, featuring updated Windows and Mac OS X clients, new mobile apps and a web-based application that enable enterprise users to …

Log Management 10 comes with compliance enhancements

Ipswitch announced its log management software solution, WhatsUp Log Management 10 which provides out-of-the-box security and compliance for businesses of all sizes. The …

HTML5-based mobile security platform

AirWatch released an HTML5-based MDM platform. By leveraging HTML5, AirWatch’s management console is now even more accessible from any web-connected device, regardless …

Scammers demand $143 from Windows users, threaten with file deletion

German Windows users are the latest target of some pretty brazen scammers, warns Panda Security. The whole thing starts with a Trojan – likely received via spammy emails …

iPhone 5 “test and keep” spam campaign

As the predictions about the release of iPhone 5 seem all to point to the beginning of October, cyber scammers have decided to add to the frenzy by offering the coveted device …

DigiNotar hacker shares details on GlobalSign breach

Yesterday, GlobalSign announced that it will not be issuing any more certificates until the claims about a breach into its networks made by the “Comodohacker” are …

Cybercriminals impersonating government agencies

GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …

Drupal Author Pane module security bypass weakness

A weakness has been reported in the Author Pane module for Drupal, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …

How to deal with Internet security threats

How to use the Internet while staying secure has always been a concern for businesses. Over the last couple of years there have been many changes in the Internet threat …

Mobile malware criminal command-and-control activity

Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is …

Don't miss

Cybersecurity news