Help Net Security
Android Trojan attacks European banks
Recently Trusteer discovered the first Tatanga-based man in the mobile (MITMO) attack as well as new SPITMO configurations which are targeting Android mobile banking users in …
Restoring critical applications a top concern
Organizations now operate in a world where employees and customers alike expect critical services to be available and accessible at all times, and it’s forcing IT to …
Websense TRITON now with new malware and data theft defenses
Websense announced 10 new malware and data theft defenses, spear phishing protection with cloud sandboxing, and a forensic reporting dashboard with security intelligence. With …
WatchGuard updates XTM operating system
WatchGuard unveiled the latest release of the operating system that forms the backbone of WatchGuard XTM security solutions – WatchGuard Fireware XTM 11.6. In …
Free tool protects Internet connections from DNS Changer shutdown
Bitdefender released a tool to prevent computer users worldwide infected with DNS Changer malware from losing their internet connection on July 9th. The U.S. Federal Bureau of …
Open source IDS Suricata 1.3 released
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Several characteristics of …
Enterprise log managers: An unsexy but vital tool
Ultimately, the goal of Enterprise Log Management (ELM) is to get your most critical events escalated to your operations staff to react and respond with the appropriate …
Worldwide IT spending to surpass $3.6 trillion in 2012
Worldwide IT spending is on pace to reach $3.6 trillion in 2012, a 3 percent increase from 2011 spending of $3.5 trillion, according to the latest outlook by Gartner. …
Cuckoo Sandbox: Automated malware analysis
Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …
Think Like a Programmer
The real challenge of programming isn’t learning a language’s syntax—it’s learning to creatively solve problems so you can build something great. In this …
Week in review: Android clickjacking rootkit, EU Parliament rejects ACTA, and Facebook’s contact-deleting API bug
Here’s an overview of some of last week’s most interesting news, videos and articles: Firewall management, IPv6 and you While the IPv6 protocol has been around for …
Spam campaigns using popular companies on the rise
In June, GFI threat researchers observed two fresh spam campaigns linking to Blackhole exploits which posed as confirmation emails from Twitter and Amazon. Delta Airlines …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems