Help Net Security
Increase in drive-by attacks and infected emails
In August and September 2012, the research team from Eleven, a German email security provider, recorded a significant increase in malware sent via email. The most significant …
Britain is targeted by cyber attacks every hour
This week, Foreign Secretary William Hague revealed that “not an hour goes by when a system in the UK is not being attacked”, and not only do the hackers attempt …
First European Cyber Security Month going well
Halfway through the first European Cyber Security Month (ECSM), the pilot campaign has already reached 1,986,270 people on Facebook Europe-wide. In addition, a special …
Week in review: miniFlame, Apple kills Java browser plug-in, and how to get promoted in IT security
Here’s an overview of some of last week’s most interesting news and articles: miniFlame discovered, designed for targeted cyber espionage miniFlame, also known as …
Data security and privacy stopping cloud implementations
Data security, privacy, residency, and compliance issues continue to hinder cloud adoption, with 66 percent of organizations reporting at least one cloud project that has been …
Enterprise IT supply chains will be compromised
Enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed moving forward, according to …
Self-service password management in the cloud
Ilantus released Password Express, a self-service password management solution with security and enterprise integration. It can be deployed in the cloud or on premise to meet …
Tips for protecting your privacy
Every month more than 5,000 people take to Twitter to complain about how their mobile device has been snooped on or their visual privacy invaded. Who can’t resist …
Dell unveils new enterprise vision
Dell announced plans to help businesses globally adopt modern, standards-based data center technologies that enable them to realize repeatable results and superior value at …
Windows 8 Administration Pocket Consultant
Portable and precise, this pocket-sized guide delivers ready answers for administering computers running Windows 8. Zero in on core operations and daily tasks using …
ModSecurity 2.7.0 released
ModSecurity makes full HTTP transaction logging possible, allowing complete requests and responses to be logged. Its logging facilities also allow fine-grained decisions to be …
Check Point unveils security appliance with 110GB/s throughput
Check Point launched its new 21600 Appliance that provides throughput of up to 110 Gbps, a 30 percent boost in SecurityPower units (SPUs) and ultra-low latency for …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online