Help Net Security
14,000 Indian websites hacked in 2012
It has been reported that over 14,000 Indian websites have been hacked by cyber criminals this year, an increase of nearly 57 percent from 2009. Barry Shteiman, Senior …
Fluke Networks increases BYOD device visibility
Fluke Networks announced a new BYOD Classification capability that reduces the cost and time needed to optimize and secure a wireless network for authorized and unauthorized …
Get ready for invited break-ins, malware-ridden apps and spoof attacks
It’s that time of year again when, it seems, every technology vendor suddenly becomes clairvoyant with an insatiable urge to predict the battles we need to arm ourselves …
Blue Coat acquires Crossbeam Systems
Blue Coat Systems has entered into an agreement to acquire Crossbeam Systems. The acquisition is expected to close on December 31, 2012. “Our service provider and …
Payment processor for scareware cybercrime ring jailed
A Swedish credit card payment processor was sentenced today to 48 months in prison for his role in an international cybercrime ring that netted $71 million by infecting …
Improving information security with one simple question
Anyone who has children, or has had to deal with very young children, will understand how powerful the word “why” is and how it can drive their curiosity. …
Looking to the future: Security predictions for 2013
The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement …
Reinvent your security approach
Tasked with ensuring the success of business-changing IT initiatives from mobile and BYOD to virtualization and cloud services, IT security is finding that existing security …
Windows 8 Hacks
Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With Windows 8 Hacks, you’ll learn how to make a variety …
Total Defense launches coud security solution
Total Defense announced Total Defense for Business, a solution that combines cloud computing with the delivery of multi-layered protection through the integration of various …
Week in review: Malicious QR codes, Tor-powered botnet, and Mac users hit with SMS fraud
Here’s an overview of some of last week’s most interesting news, videos and articles: Motives behind IT budget spend and 2013 cloud trends A global survey of 550 …
Top 7 security predictions for 2013
A seismic shift in who controls the Internet? Another Mac malware outbreak? Your smart TV being highjacked for a DDoS attack? Whatever 2013 may bring, it’s sure to be an …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?