Help Net Security
Record number of phishing websites in the wild
The number of brands targeting by phishing attacks sustained an all-time high of 382 in February and March, while cybercrime gangs deployed a record number of phishing …
67,000 phones to be lost or stolen during the Olympics
Numbers of smartphones and other portable networked devices have exploded over the past few years. As a result, this year’s Games will see the largest-ever risk of …
Netgear eliminates WiFi dead spots
Netgear announced the WiFi Booster for Mobile (WN1000RP). It amplifies WiFi coverage for mobile devices in the home by extending and strengthening an existing WiFi signal, …
SaaS web application security scanning from NT OBJECTives
NT OBJECTives announced NTOSpider On-Demand, a cloud-based service enables organizations to scan thousands of applications while controlling scanning costs and optimizing …
Free advanced evasion technique testing software
Stonesoft released Evader, the first software-based testing tool that empowers organizations to test their network security solutions’ ability to withstand advanced …
Open source smart meter hacking framework released
SecureState announced the release of the full open source code of Termineter, a framework that allows users to assess the security of Smart Meter utility meters over the …
Detecting mobile device vulnerabilities using Nessus
This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.
Free data masking download
Solix Technologies announced its EDMS Data Masking Standard Edition, a high performance data masking solution for PCI/PII compliance. Through a free download users are able …
iOS digital identity app WISeID 4.0 released
WISeKey lauched WISeID 4.0 for iOS. The digital identity app can create an accountable identity from its personal data organizer, which securely stores private details such as …
Good Technology enhances enterprise mobility solutions
Good Technology announced the addition of Good Dynamics AppKinetics to its Good Dynamics platform, which helps protect enterprise data in transit, at rest, and in use on …
Hadoop: The Definitive Guide, 3rd Edition
Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. …
Week in review: Grum botnet shutdown, Android malware, and Madi Trojan targeting the Middle East
Here’s an overview of some of last week’s most interesting news, articles and reviews: How to make smart grids To prepare for a successful roll-out of smart grids, …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised