Help Net Security
Microsoft names source of RDP code leak
Microsoft confirmed that, as speculated months ago, the RDP PoC exploit was sourced from China. It was apparent that the exploit originated in the West as researchers noticed …
Top 10 business logic attack vectors
Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive …
Comprehensive email threat protection from GFI Software
In order to help SMBs in the fight against email-borne threats, GFI Software today announced the availability of GFI MailEssentials 2012 UnifiedProtection. The solution …
NetIQ minimizes the risk of unauthorized access
Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. …
Location-based apps thrive despite privacy concerns
Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for …
Autorun-based threats account for 12% of global infections
Bitdefender announced that more than four years after Autorun was eliminated from operating systems, worms that take advantage of the antiquated feature account for more than …
ISO 27001 benefits: How to obtain management support
As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …
50% of businesses feel the cloud is too risky
Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity …
Child ID theft epidemic continues to spread
The epidemic of child identity theft revealed last year is continuing to grow. 10.7% of the nearly 27,000 children in the study are victims of identity theft, 35 times higher …
Users feel insecure on social media sites
More than four out of five users worry about their personal information being stolen or misused on social media sites such as Facebook, Google+ and Twitter, according to …
Audited way to reset or unlock domain account passwords
Lieberman Software released Account Reset Console 6.0, which permits delegated users to reset their own passwords and unlock their own accounts without involving IT staff, …
Identity as a Service platform for cloud service providers
Symplified announced Symplified Structure which enables telcos, cloud service providers, cloud application brokers, and cloud application hosting companies to seamlessly …