Help Net Security
Cyber security strengthened at EU institutions
EU institutions have reinforced their fight against cyber threats by establishing the EU’s Computer Emergency Response Team, or CERT-EU, on a permanent basis. This …
Full keynote lineup announced for RSA Conference Europe 2012
RSA Conference announced its complete line-up of keynote speakers for the 13th annual RSA Conference Europe, taking place from 9th -11th October 2012, at the Hilton London …
The QR code: A new frontier in mobile attackability
A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …
Every third computer in North America attacked while online
An in-depth analysis of the nature of cybercrime in North America and Western Europe in the first six months of 2012 by Kaspersky Lab found that the computers of 33.4% of …
Splunk App for PCI Compliance 2.0 released
Splunk announced the general availability of the Splunk App for PCI Compliance 2.0. The app is for any organization looking for a simple, intuitive reporting and analysis …
Microsoft releases System Center 2012 Configuration Manager SP1 beta
The beta of Configuration Manager Service Pack 1 is now available for download on the Microsoft Download Center. One of the great new benefits of this platform are Windows 8 …
Cloud-connected backup and recovery platform
EVault updated its cloud-connected backup and recovery platform. EVault 7 offers a more resilient architecture, with enhanced replication that delivers faster backups – …
WD unveils thinnest 2.5-inch hybrid hard drive
WD announced it is sampling a 5mm-thin hard disk drive featuring hybrid technology. WD has developed hard drives slim enough for integration into today’s thinnest …
Windows Server 2012 Pocket Consultant
Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of Windows Server 2012. Zero in on core operations and daily tasks using …
Microsoft releases two security bulletins
The Microsoft Security Bulletin Summary for September 2012 includes just two bulletins, both of which address vulnerabilities rated “important.” The first, …
39% of IT staff can get unauthorized access to sensitive information
IT professionals are allowed to roam around corporate networks unchecked, according to a survey of more than 450 IT professionals by Lieberman Software. It found that 39% of …
Jump in mobile app and banking scams
In August, GFI threat researchers identified a number of high-profile fake mobile application scams, along with a spike in email scams targeting UK banking and government …
Featured news
Resources
Don't miss
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks