Help Net Security
Week in review: Hotmail 0-day bug, CISPA, and securing embedded devices
Here’s an overview of some of last week’s most interesting news, podcasts and articles: SpyEye botnet for sale at bottom price A drop in the price asked for the …
Mobile malware increasingly delivered via social networks
The growing use of mobile devices to connect with social networks is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices …
PayPal no longer the most phished brand
A new phishing survey released by the Anti-Phishing Working Group (APWG) reveals that in the second half of 2011, China’s Taobao.com became the world’s most …
HITRUST establishes incident response center for healthcare Industry
In light of growing threats posed by cyber attacks targeted at healthcare organizations, the Health Information Trust Alliance (HITRUST) has established the HITRUST …
Web and content filtering appliances by Bloxx
Bloxx announced the release of the Bloxx Secure Web Gateway (SWG), an appliance that combines the company’s dynamic real-time content analysis and classification engine, …
Anomaly detection solution for mobile banking
Guardian Analytics announced FraudMAP Mobile, the company’s latest fraud prevention innovation, purpose-built to identify suspicious mobile banking activity. The …
Cisco CCNP Service Provider certification announced
Cisco announced the availability of its Cisco CCNP Service Provider certification developed to validate the skills and knowledge of network engineers to deploy and optimize a …
A security scanner for SAP 2.0
ERPScan has released ERPScan Security Scanner for SAP 2.0 – a complex solution to continuously monitor all areas of SAP security, from vulnerability assessment and …
Centralized management for self-encrypting drives
Credant Technologies announced Credant Enterprise Edition 7.3, which includes improved features and functionality to help organizations meet their growing needs for protecting …
36 credit card fraud websites taken down
36 website domains, used to sell compromised card data, have been taken down following a day of action on Wednesday to target online criminals by SOCA working with the FBI and …
Majority of web apps vulnerable to most frequent exploits
84 percent of web applications from public companies were deemed unacceptable when measured against the OWASP Top 10 most frequently exploited web application vulnerabilities, …
World renowned experts to examine SSL governance
Just two months from its inauguration date at the RSA Conference in San Francisco on February 29, the Trustworthy Internet Movement (TIM) announced today that it has chosen …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)