Help Net Security
Top 10 business logic attack vectors
Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive …
Comprehensive email threat protection from GFI Software
In order to help SMBs in the fight against email-borne threats, GFI Software today announced the availability of GFI MailEssentials 2012 UnifiedProtection. The solution …
NetIQ minimizes the risk of unauthorized access
Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. …
Location-based apps thrive despite privacy concerns
Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for …
Autorun-based threats account for 12% of global infections
Bitdefender announced that more than four years after Autorun was eliminated from operating systems, worms that take advantage of the antiquated feature account for more than …
ISO 27001 benefits: How to obtain management support
As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …
50% of businesses feel the cloud is too risky
Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity …
Child ID theft epidemic continues to spread
The epidemic of child identity theft revealed last year is continuing to grow. 10.7% of the nearly 27,000 children in the study are victims of identity theft, 35 times higher …
Users feel insecure on social media sites
More than four out of five users worry about their personal information being stolen or misused on social media sites such as Facebook, Google+ and Twitter, according to …
Audited way to reset or unlock domain account passwords
Lieberman Software released Account Reset Console 6.0, which permits delegated users to reset their own passwords and unlock their own accounts without involving IT staff, …
Identity as a Service platform for cloud service providers
Symplified announced Symplified Structure which enables telcos, cloud service providers, cloud application brokers, and cloud application hosting companies to seamlessly …
Biggest enterprise data recovery myths
Kroll Ontrack announced the top five data recovery myths. From concerns over cost, system complexity and data protection to resource constraints and simple misunderstandings, …
Featured news
Resources
Don't miss
- Incident response lessons learned the hard way
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work
- Energy sector orgs targeted with AiTM phishing campaign