Help Net Security
Techniques malware authors use to evade detection
FireEye released a new report that reveals several techniques used by advanced malware to sidestep signature-based defenses during attacks. Today’s sophisticated, …
Cybergangs alter infrastructure abuse techniques
Phishing attack frequency declined 20 percent from Q4 2012 to Q1 2013, due to a precipitous drop in virtual server phishing attacks. APWG statistics indicate that phishing …
Real-time data analysis increases DDoS defenses
Real-time analytics are a powerful tool for identifying denial of service attacks and other cyber threats, risks and events. Prolexic recommends that the information gleaned …
Hacker expo and all-women keynote line coming to Hack In The Box
Hack In The Box has announced HITB2014 Amsterdam will feature an all-new Haxpo – a massive Hacker Expo open for free to professionals and the public. Haxpo will be …
Protegrity expands enterprise big data protection capabilities
Protegrity released the Protegrity Data Security Platform 6.5, which expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache …
Panda Security updates Cloud Office Protection
Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network. …
Self-encrypted 2.5″ SATA SSD from Microsemi
Microsemi announced a secure, half-terabyte SSD for mobile video surveillance operations, SANs and other high capacity storage applications requiring superior real-time data …
Free first aid kit for computer viruses
Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malware. It can be downloaded for free …
Keep your laptop safe while using Wi-Fi hotspots
The relaxing atmosphere of surfing at the beach makes it easy to forget about the sharks. Connecting to an unsecured network poses serious risks to your laptop and data. In a …
NSS Labs unveils Threat Modeling and Threat Forecasting
NSS Labs announced availability of two new advisory services – Threat Modeling and Threat Forecasting – helping clients to better understand their risk and distill …
Universities are putting private financial data at risk
HALOCK found that over 50% of the colleges and universities investigated allow for the transmission of sensitive information over unencrypted (and therefore unprotected) email …
Automated remediation for APTs and 0-days
ThreatTrack Security unveiled The Spyder Initiative, a development strategy for solving the challenges cyber security professionals face, including the creation of custom, …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems