Help Net Security
Week in review: Sizing up botnets, Conficker still alive and kicking, and a new exploit kit spotted in the wild
Here’s an overview of some of last week’s most interesting news, podcasts and articles: What’s in your daily slice of spam? Bitdefender decided to look at …
Microsoft to release seven bulletins, three critical
The Microsoft Security Bulletin Advance Notification for May 2012 contains 7 bulletins: three rated “critical” and the rest “important.” Just when most …
A new class of CISO is coming
A new IBM study reveals a clear evolution in information security organizations and their leaders with 25 percent of security chiefs surveyed shifting from a technology focus …
Microsoft names source of RDP code leak
Microsoft confirmed that, as speculated months ago, the RDP PoC exploit was sourced from China. It was apparent that the exploit originated in the West as researchers noticed …
Top 10 business logic attack vectors
Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive …
Comprehensive email threat protection from GFI Software
In order to help SMBs in the fight against email-borne threats, GFI Software today announced the availability of GFI MailEssentials 2012 UnifiedProtection. The solution …
NetIQ minimizes the risk of unauthorized access
Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. …
Location-based apps thrive despite privacy concerns
Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for …
Autorun-based threats account for 12% of global infections
Bitdefender announced that more than four years after Autorun was eliminated from operating systems, worms that take advantage of the antiquated feature account for more than …
ISO 27001 benefits: How to obtain management support
As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …
50% of businesses feel the cloud is too risky
Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity …
Child ID theft epidemic continues to spread
The epidemic of child identity theft revealed last year is continuing to grow. 10.7% of the nearly 27,000 children in the study are victims of identity theft, 35 times higher …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems