Help Net Security
HITBSecConf2012: New hackathon, CTF and high-profile keynotes
Hack In The Box Security Conference is back again in Amsterdam this year for the European leg of its annual circuit. From the 21st to the 25th of May, this deep knowledge …
Millions of infected Android apps… or not?
Over the weekend, several websites picked up Symantec’s story about Trojanized apps on the official Android Market. This happens from time to time, but what got …
Cisco updates switching portfolio
According to the Cisco Cloud Index, more than 50 percent of computing workloads in data centers will be cloud-based by 2014, and global cloud traffic will grow more than 12 …
Malware redirects bank phone calls to attackers
Trusteer have discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the UK and US. Ice IX is a modified variant …
Detecting the DNS Changer malware
January marked half-time for the folks at the DNS Changer Working Group (DCWG) who are now running the DNS servers originally used in the Rove botnet. Ever since a …
(IN)SECURE Magazine issue 33 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 33 has been released today. Table of contents: …
Sophos wireless access point supports 5 GHz connections
Sophos announced the Astaro AP50, its new dual-band/dual-radio capable wireless access point. The new addition to Astaro’s wireless access point family supports both …
The Tangled Web: A Guide to Securing Modern Web Applications
Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application …
Greatest risks to database security
The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by …
The state of global cyber-readiness
McAfee and the Security and Defence Agenda (SDA) revealed the findings from a report that paints a global snapshot of current thinking about the cyber-threat and the measures …
Identity and access management trends
Six major trends will drive the evolution of corporate management of identity and access management (IAM) and privacy management in 2012, according to Gartner. “In 2012, …
Apache Shiro: Java security framework
Apache Shiro is a Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s API, you can secure any …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems