Help Net Security
Dell acquires Credant Technologies
Dell has reached an agreement to acquire Credant Technologies, a provider of data protection solutions to control, manage and secure data sent from endpoints to servers, …
Java apps can now be prevented from running in the browser
Oracle has released the newest version of its Java SE Development Kit (JDK 7u10), and apart from patching a few bugs, it has also introduced a couple of welcome changes that …
Who has access to your network and data?
GFI Software released guidelines for businesses ahead of the end of year holiday period, traditionally a time when many office-based businesses close for the festive season, …
56 alleged members of card fraud ring arrested in Europe
56 suspected members of a major network of payment card fraudsters (38 in Bulgaria, 17 in Italy and 1 in the Netherlands) have been arrested in a coordinated raid across …
14,000 Indian websites hacked in 2012
It has been reported that over 14,000 Indian websites have been hacked by cyber criminals this year, an increase of nearly 57 percent from 2009. Barry Shteiman, Senior …
Fluke Networks increases BYOD device visibility
Fluke Networks announced a new BYOD Classification capability that reduces the cost and time needed to optimize and secure a wireless network for authorized and unauthorized …
Get ready for invited break-ins, malware-ridden apps and spoof attacks
It’s that time of year again when, it seems, every technology vendor suddenly becomes clairvoyant with an insatiable urge to predict the battles we need to arm ourselves …
Blue Coat acquires Crossbeam Systems
Blue Coat Systems has entered into an agreement to acquire Crossbeam Systems. The acquisition is expected to close on December 31, 2012. “Our service provider and …
Payment processor for scareware cybercrime ring jailed
A Swedish credit card payment processor was sentenced today to 48 months in prison for his role in an international cybercrime ring that netted $71 million by infecting …
Improving information security with one simple question
Anyone who has children, or has had to deal with very young children, will understand how powerful the word “why” is and how it can drive their curiosity. …
Looking to the future: Security predictions for 2013
The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement …
Reinvent your security approach
Tasked with ensuring the success of business-changing IT initiatives from mobile and BYOD to virtualization and cloud services, IT security is finding that existing security …
Featured news
Resources
Don't miss
- Law enforcement takes down proxy botnets used by criminals
- Compromised SAP NetWeaver instances are ushering in opportunistic threat actors
- How to give better cybersecurity presentations (without sounding like a robot)
- Layoffs pose a cybersecurity risk: Here’s why offboarding matters
- Fake AI platforms deliver malware diguised as video content