Help Net Security
IEEE approves revision of wireless LAN standard
IEEE announced the publication of IEEE 802.11-2012, which defines the technology for the world’s premier wireless LAN products. The new IEEE 802.11-2012 revision has …
Ransomware increases in prevalence as cyber-criminal tactic
In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly prevalent malware statistics of previous years, according …
Situational awareness platform uses power of big data
Despite all the promises made by SIEM vendors over the last decade, enterprise security analysts often have no way to know if their IT systems have been compromised by an APT …
Windows applications on iOS
GraphOn announced its GO-Global iOS client. Available immediately as a free downloadable app from the App Store, the new client is used in conjunction with GraphOn’s …
NetShade 5: Anonymous proxy for the Mac
NetShade makes your presence on the web anonymous by routing your connection through a proxy server. It keeps you from leaving your digital “calling card” at every …
Theory of Computation
Offering an accessible approach to the topic, Theory of Computation focuses on the metatheory of computing and the theoretical boundaries between what various computational …
Week in review: Sizing up botnets, Conficker still alive and kicking, and a new exploit kit spotted in the wild
Here’s an overview of some of last week’s most interesting news, podcasts and articles: What’s in your daily slice of spam? Bitdefender decided to look at …
Microsoft to release seven bulletins, three critical
The Microsoft Security Bulletin Advance Notification for May 2012 contains 7 bulletins: three rated “critical” and the rest “important.” Just when most …
A new class of CISO is coming
A new IBM study reveals a clear evolution in information security organizations and their leaders with 25 percent of security chiefs surveyed shifting from a technology focus …
Microsoft names source of RDP code leak
Microsoft confirmed that, as speculated months ago, the RDP PoC exploit was sourced from China. It was apparent that the exploit originated in the West as researchers noticed …
Top 10 business logic attack vectors
Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive …
Comprehensive email threat protection from GFI Software
In order to help SMBs in the fight against email-borne threats, GFI Software today announced the availability of GFI MailEssentials 2012 UnifiedProtection. The solution …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)