Help Net Security
Week in review: Hidden security risks of top mobile apps, Facebook invites white hats to attack its networks
Here’s an overview of some of last week’s most interesting news, articles and reviews: Penetration testing tool masquerades as surge protector In the same way that …
Personal and financial information under attack
Cybercriminals have increased their focus in targeting individuals and organizations of all sizes to steal personal and financial information according to Trend Micro. Among …
Most users think content is more important than the device
A global F-Secure survey of broadband subscribers has identified security, privacy and issues relating to the storing and sharing of digital content as key concerns. The …
Detect and shut down rogue mobile apps
To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …
Broadcom introduces 5G WiFi combo chip for smartphones
Broadcom introduced the BCM4335, the first complete 5G WiFi combo chip for smartphones, tablets, ultrabooks and other mobile devices. 5G WiFi, the 5th generation of Wi-Fi …
First holistic security platform unveiled at Black Hat
AccessData released Cyber Intelligence & Response Technology 2 (CIRT 2), a platform that integrates network and computer forensics, malware analysis, large-scale data …
GFI VIPRE Mobile Security Premium now on Android devices
In addition to securing users from more than 10,000 known Android viruses, GFI VIPRE Mobile Security Premium helps them to keep their children safe, protect personal …
Qualys adds IPv6 support to FreeScan
Qualys announced at Security B-Sides Las Vegas that FreeScan – a popular free service that allows organizations to scan web sites or publicly facing IP addresses for …
Cybercriminals use social engineering to extend lifecycle of malware
Android smartphone users remain a lucrative target as the platform currently has 59 percent global market share and is on track to stay the most shipped mobile operating …
Hidden security risks of top mobile apps
Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …
What will the workplace of the future look like?
IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …
Location tracking becomes more attractive
In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform