Help Net Security
Security Metrics, A Beginner’s Guide
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of …
Over 50% use unauthorized file sharing apps at work
While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …
The rise of Tumblr and Google Play spam campaigns
In May, GFI threat researchers observed a number of attacks focused on Tumblr users including two spam campaigns centred around a fake “Tumblr Dating Game” which …
People would rather lose their wallet than their phone
People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …
Damballa enhances cyber threat protection for ISPs
Damballa announced general availability of CSP 1.7, a cyber threat solution for ISPs and telecommunications providers that detects subscriber malware infections by monitoring …
Gaps in anti-bribery compliance at multinational corporations
Despite a steady increase in Foreign Corrupt Practices Act (FCPA) investigations and enforcements over the last several years, the majority of corporate compliance officers at …
LogRhythm and Imperva partner on database and web application security
LogRhythm announced a partnership with Imperva. It includes technical integration that enables Imperva’s SecureSphere solution to feed data to LogRhythm’s SIEM 2.0 …
How fraudsters are disguising PCs to fool device fingerprinting
Cybercriminals know that financial and ecommerce providers often use fraud detection systems that monitor for anomalous transactions and behaviors. In order to bypass these …
Most trusted universities for online activity
After analyzing online transactions such as credit applications and e-commerce purchases, iovation found the University of California at San Francisco to be the university …
Free dual-engine portable malware scanner
Emsisoft Emergency Kit 2.0 protects against malware infections of any kind. It is fully portable and therefore requires no installation whatsoever, ready to be launched …
Guard your website against malicious activity with WebsiteDefender
Acunetix released WebsiteDefender, an online security monitoring service which helps you secure websites against malware and hacker activity. Google’s security blog …
Fortinet announces 500+ Gbps protection
Fortinet announced that the Fortinet FortiGate-5140B chassis, powered by FortiGate-5101C blades, has achieved 536 Gbps of blended application and security attack traffic …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?