Help Net Security
Emerging trends in cyber-attack methodology
Websense documented the latest shift in complex attack trends, evolution in the threat ecosystem and shifting motivation of cyber-attacks. “Cybercriminals continue to …
Does IP convergence open you up to hackers?
Recent reports indicate that unauthorized persons gained access to Target’s network using credentials stolen from a company that worked on the company’s …
Public WiFi users regularly access sensitive info
A considerable portion of U.S. adults who’ve ever used free public WiFi say they have accessed sensitive information while using it. According to a PRIVATE WiFi survey, …
Windows XP will leave organizations severely exposed
The clock is ticking – as of this week Microsoft will no longer support Windows XP. The operating system will pose an increasing risk to its users, making it more …
Organizations need data analytics to tackle supply chain fraud
As complexity in global supply chain networks continues to increase, less than one-third (26 percent) of business executives are using data analytics tools and processes to …
Samsung Galaxy enterprise mobility management
Codeproof announced the availability of Enterprise Mobility Management (EMM) for Samsung Galaxy line of devices within its cloud based management platform. “Over the …
Week in review: AET costs, Windows XP deadline, routers expose ISPs to DNS-based DDoS attacks
Here’s an overview of some of last week’s most interesting news, reviews and articles: Cost of Advanced Evasion Techniques in recent data breaches A new report by …
Microsoft to release only four bulletins on Tuesday
The Microsoft April security release is almost upon us with security updates scheduled to deploy on Tuesday, April 8th. This day will go down in history as a major milestone …
This phishing page can do more than steal your credentials
Every now and again, we read reports about phishing sites that look dangerously convincing—you can hardly tell the real one apart from the fake one anymore, unless you know …
Messaging apps turn to growth hacking to compete
Mobile apps in North America send 8.5 times more invitations per application in the last six months, in a race to gain new users. As part of a new report, AdaptiveMobile has …
Windows XP usage lower across industries
Next week, Microsoft will deliver its last set of public security patches for Windows XP. The end-of-life for XP which has been announced for a number of years now, means that …
Thecus expands SMB and enterprise NAS line
Thecus is pleased to announce the expansion on the company’s SMB and Enterprise NAS line with the 10GbE Ready N7710 and N8810U. These new models offer identical hardware …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online