Help Net Security
Enterprise log managers: An unsexy but vital tool
Ultimately, the goal of Enterprise Log Management (ELM) is to get your most critical events escalated to your operations staff to react and respond with the appropriate …
Worldwide IT spending to surpass $3.6 trillion in 2012
Worldwide IT spending is on pace to reach $3.6 trillion in 2012, a 3 percent increase from 2011 spending of $3.5 trillion, according to the latest outlook by Gartner. …
Cuckoo Sandbox: Automated malware analysis
Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …
Think Like a Programmer
The real challenge of programming isn’t learning a language’s syntax—it’s learning to creatively solve problems so you can build something great. In this …
Week in review: Android clickjacking rootkit, EU Parliament rejects ACTA, and Facebook’s contact-deleting API bug
Here’s an overview of some of last week’s most interesting news, videos and articles: Firewall management, IPv6 and you While the IPv6 protocol has been around for …
Spam campaigns using popular companies on the rise
In June, GFI threat researchers observed two fresh spam campaigns linking to Blackhole exploits which posed as confirmation emails from Twitter and Amazon. Delta Airlines …
Getting ahead of the security poverty line
Being stuck below the security poverty line isn’t about budget, it’s about attitude, motivation, and focusing not simply on basic compliance but rather on your …
Microsoft to release nine bulletins
The Microsoft Security Bulletin Advance Notification for July 2012 contains nine bulletins, with three listed as “critical” and six listed as …
Understanding IPv6, 3rd Edition
Get in-depth technical information to put IPv6 technology to work—including networks with hardware running Windows 8 and Windows Server 2012. Written by a networking expert, …
Security tips to stay safe this summer
PandaLabs published its security tips for consumers to stay safe this summer and avoid falling victim to computer fraud. During the summer, people (especially children) have …
Utility bill scam steals personal information
The President of the United States is not going to pay your utility bill. Atmos Energy is warning customers about the latest version of a scam that promises federal stimulus …
8,000+ mobile devices left at top U.S. airports
Credant Technologies announced the results of their survey of top airports in the United States. In the last year, travelers left behind 8,016 mobile devices at seven of the …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)