Help Net Security
Data thieves and their motives
Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, according to a new Verizon report. Taking the top spot for all …
Wireless hack attacks target critical infrastructure
Critical infrastructure control systems are at risk from wireless attacks carried out over Software Defined Radio (SDR), according to Digital Assurance. Critical network …
Dangerous CSRF attacks up 132%
FireHost has announced today its Q1 2013 web application attack statistics, detailing the type and number of the most dangerous cyberattacks blocked by the firewalls that …
The importance of crowd-sourced threat intelligence
Imperva analyzed real-world attack traffic against 60 web applications between January and March 2013 to identify common attack patterns. Businesses can reduce the risk of …
SafeNet releases first crypto hypervisor
At a time when confidence in perimeter security is waning, and organizations are increasingly facing business pressure to adopt cloud strategies and consolidate their data …
ForeScout and FireEye team for APT mitigation
ForeScout and FireEye announced an integrated approach to dynamically mitigate APTs and zero-day attacks. According to FireEye’s 2H2012 Advanced Threat Report, on …
CyberReveal: A new approach to security intelligence
BAE Systems Detica launched CyberReveal, an analytics and investigation product that gives companies the intelligence they need to protect their valuable intellectual property …
Big data, analytics, and cloud drive software growth
For 2012, the worldwide software market grew 3.6% year over year reaching a total market size of $342 billion, according to IDC. 2012 confirms the beginning of a more …
Reliance on passwords inhibits online business
A new study by the Ponemon Institute takes a deep dive into consumer perceptions around how organizations are securing their access, and what they would consider to be the …
The age of information highway robbery
Distributed Denial of Service (DDoS) attacks are a widespread problem in the iGaming industry with hackers betting that they can make money from online gambling merchants by …
Qualys and FireMon enable real-time network risk visibility
Qualys and FireMon announced the integration of QualysGuard Vulnerability Management (VM) and FireMon Security Manager with Risk Analyzer in FireMon’s upcoming 7.0 …
Week in review: WordPress sites under attack, Android Trojan downloaded by millions, pass-thought s instead of passwords
Here’s an overview of some of last week’s most interesting news, videos and articles: Real-world test of 21 antivirus products AV-Comparatives have released …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations