Help Net Security
Microsoft patches 20 vulnerabilities
Microsoft Security Bulletin Summary for October 2012 contains 7 bulletins to patch 20 vulnerabilities. MS12-064, rated at critical, affects Microsoft Word and would allow an …
Surge in Android adware
Between the beginning of July and the end of September, FortiGuard Labs researchers reported a marked increase in Android adware, new evidence suggesting that Zitmo …
Cybercrime costs rise nearly 40 percent
HP today unveiled new research indicating that the cost and frequency of cybercrime have both continued to rise for the third straight year. According to the third annual …
Trend Micro introduces defense against targeted attacks
Trend Micro is introducing Custom Defense – an advanced threat protection solution that enables businesses and government agencies not only to detect and analyze APTs …
New TDL4 rootkit successfully hiding from AV
A new variant of TDL4 has been identified, and it is now ranked as the second most prevalent malware strains within two months since detection. The characteristics are similar …
Penetration testers need to advance their skills
Ahead of SANS London 2012, Europe’s largest IT security training event, a top security expert and trainer is warning that a big challenge and knowledge gap for …
NatWest banking scam hits UK online banking clients
Bitdefender detected a new scam where criminals pretending to be from NatWest bank are attempting to steal customers’ credentials by circulating a fake satisfaction …
Netgear developer program ignites app creation
Netgear announced a new developer program for developers to create new apps to help customers get more out of the millions of Netgear devices purchased every month. Developers …
USBGuru simulated attack service
Wombat launched USBGuru, a simulated USB attack service to address the growing threat of fraud due to rogue memory devices loaded with malware. USBGuru is a …
Predicting Malicious Behavior
Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal …
iPhone-controlled keyless lock
Lockitron replaces keys with your phone. With Lockitron, you can instantly grant family, friends and guests access to your home or business from anywhere in the world using …
Week in review: White House Military Office breach, Brian Honan on infosec pros and the Incapsula review
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Interesting times for information security professionals Our modern …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)