Help Net Security
Mikko Hypponen: How the NSA betrayed the world’s trust
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American …
HyTrust acquires HighCloud Security
HyTrust has acquired HighCloud Security, a provider of cloud encryption and key management software. By combining HyTrust’s administrative visibility and control with …
GFI MAX Mobile Device Management launched
GFI MAX announced GFI MAX Mobile Device Management (MDM), a new offering for managed services providers looking to create new revenue opportunities as increasing numbers of …
Free eBook: 9 Steps to Cybersecurity
9 Steps to Cybersecurity from expert Dejan Kosutic is a free e-book designed specifically to take you through cybersecurity basics. Aimed at people with limited prior …
PCI DSS 3.0 is now available
Today the PCI Security Standards Council (PCI SSC) published version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS). …
Cybercriminals opting for real-time malware campaigns and phishing
The third quarter of 2013 saw further use of real-time malware campaigns and a dramatic increase in phishing sites, according to Commtouch. The ever-growing exploitation of …
Cybercrime gangs seek victims in untapped markets
A record number of brands were targeted by phishers in the second quarter of 2013, according to APWG. A total of 639 unique brands were targeted by phishing attacks in the …
Employees stuck with unauthorized file sharing services
Most employees (81%) access work documents on the go. Yet in the absence of an enterprise-grade file sharing alternative, 72% are resorting to unauthorized, free file-sharing …
Red Hat delivers cloud management for OpenStack
Red Hat announced the next release of its cloud management platform, Red Hat CloudForms 3.0. CloudForms already provided essential enterprise-level management and automation …
Hypervisor-based, hardware-assisted system monitoring
In the last few years, many different techniques have been introduced to analyse malicious binary executables. Most of these techniques take advantage of Virtual Machine …
Most visits to a login page are made by malicious tools
Incapsula surveyed 1,000 websites over a 90-day period, during which we recorded over 1.4 million unauthenticated access attempts and 20,376 authenticated logins. Their data …
New Microsoft 0-day vulnerability under attack
Microsoft has released security advisory KB2896666 informing of a vulnerability (CVE-2013-3906) in the TIFF graphics format that is seeing limited attacks in the Middle East …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance