Help Net Security
Umbrella by OpenDNS Service blocks advanced cyber attacks
The new release of the OpenDNS Umbrella Web security platform has been enhanced with predictive detection capabilities provided by the Umbrella Security Graph. It can …
AWS cloud management APIs: Don’t overlook a key security component
Xceedium has enhanced Xsuite to include protection for the Amazon Web Services management APIs that advanced cloud customers use to monitor and configure their AWS …
DDoS attack size growing dramatically
Arbor Networks released data on DDoS attack trends for the first half of 2013. The data shows that DDoS continues to be a global threat, with a clear increase in attack size, …
Study on private vs public sector software glitches
In the private sector, software errors are causing both financial and reputational damage. A new study identified private sector businesses in the banking, retail and mobile …
Security complexity and internal breaches are key concerns
Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses. 64% of respondents to a Check …
FTC crackdown on “free gift card” scammers
The FTC has moved to shut down an international network of scammers that sent millions of unwanted text messages to consumers, using the lure of “free” gift cards …
Sharp increase in blended, automated attacks
FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to …
Norman Shark updates Malware Analyzer G2
Norman Shark announced Malware Analyzer G2 (MAG2) 4.0, which provides hybrid analysis, and Network Threat Discovery (NTD) 5.1, a cyberattack discovery system that …
nPulse updates its flow and packet capture appliance
nPulse released a new version of its Capture Probe eXtreme (CPX) flow and packet capture appliance, which provides a packet indexing solution at 30 million packets per second. …
To achieve good security, you need to focus on business
In September 2001, as the Nimda computer worm devastated networks worldwide, we in IT security thought that the management will finally wake up and see how important it was to …
The scary implications of Google Glass
Google Glass, for all its promise, has some scary implications. Here is my list of potential challenges we face with Glass: User experience Social awkwardness Privacy (or lack …
Video: Hackers for hire
Hackers are the 21st century warriors who worry many. As everything we use becomes increasingly connected, so their opportunities to hack, divert or destroy increase. NATO …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices