Help Net Security
Software platform for security in industrial control systems
Industrial Defender announced its new software product purpose-built for operators of automation systems, including NERC CIP-affected power utilities. Industrial Defender …
Protecting Mac OS X from privacy threats
SecureMac.com released PrivacyScan, a utility designed for people who value privacy and want to keep their online and offline experiences private. Every time you surf the web …
Ubuntu Unleashed 2012 Edition
Ubuntu Unleashed is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been …
Web attacks peak at 38,000 an hour
Web applications are subject to business logic attacks, according to a report by Imperva. Imperva monitored and categorized attacks across the internet targeting 40 different …
User error is the biggest threat on the Internet
Sophos unveiled a detailed assessment of the threat landscape – from hacktivism and online threats to mobile malware, cloud computing and social network security, as …
Protect your online image with tips from Microsoft
In observance of Data Privacy Day 2012, Microsoft is releasing new data about consumer behaviors online and is offering guidance and tips to help people better manage their …
Malicious QR codes and the persistence of rootkits
Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …
Endpoint security through whitelisting
The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise. This feature …
Computer Security Fundamentals, 2nd Edition
This book brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. It …
Organizations to replace BI functions with cloud offerings
Nearly one third of organizations either already use or plan to use cloud or software-as-a-service (SaaS) offerings to augment their core business intelligence (BI) functions, …
“Chuck Norris is dead” Facebook scam
Chuck Norris, the popular martial artist/ actor whose “tough guy” image has spawned a countless jokes and memes on the Internet, has been killed off by Facebook …
Carberp Trojan targets French broadband subscribers
Last year, Carberp emerged on the online banking fraud scene as a competitor to the dominant financial malware platforms Zeus and SpyEye. Trusteer recently discovered a …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025