Help Net Security
Researchers spot SMS Trojan active in the US
For the first time ever, Kaspersky Lab researchers have detected an active SMS Trojan in the United States. The malware in question is an SMS-sending Android Trojan dubbed …
DrDoS attacks to reach 800 Gbps in 2015
While the network time protocol (NTP) DrDoS threats that became prevalent in early 2014 have been contained, new distributed reflected denial of service threats will lead to …
Mobile bad bots running across most top mobile operators
During 2013, Distil Networks fingerprinted and catalogued 2.2 billion bad bots, or 31 percent of the bad bots that exist in Distil’s database of 7-billion bad bots. Bad …
Learning from others
The old saying “one man’s misfortune is another man’s gain” is eminently applicable in the information security industry. When an organization becomes …
Exchanging threat intelligence becoming essential
A new Ponemon Institute survey included more than 700 IT and IT security pros, across businesses and government agencies with an average of 12,000 employees, who answered more …
Dissecting the unpredictable DDoS landscape
DDoS attacks are now more unpredictable and damaging than ever, crippling websites, shutting down operations, and costing millions of dollars in downtime, customer support and …
Nine patterns make up 92 percent of security incidents
Verizon security researchers have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that …
Rapid7 announces security certifications for Metasploit and Nexpose
Rapid7 is launching certification programs for Nexpose administrators and Metasploit Pro specialists. “Certification enables security professionals to ensure that they …
A guide to cloud encryption and tokenization
Cloud adoption shows every sign of continuing to grow. The sharing of resources helps businesses achieve savings and agility based on economies of scale but there’s a …
How can we create a culture of secure behavior?
It’s a busy day in your company and everyone is rushing around trying to respond to requests. Audrey gets an email that looks like it’s from a partner asking her …
Insights from attack trends in the cloud
Drawing on data obtained from a customer base of 2,200, Alert Logic found a significant increase in activity across cloud and hosting environments compared to last …
Free Heartbleed scanner for Chrome and Android
To help Internet users protect themselves from the Heartbleed bug that is eroding SSL security features on websites worldwide, Trend Micro released two free Heartbleed …