Help Net Security
Week in review: pcAnywhere code leaked, Trustwave revokes “MitM” certificate, and top reasons for IT layoffs in 2011
Here’s an overview of some of last week’s most interesting news, articles and interviews: Compromised DreamHost-hosted websites lead to scams Hundreds of websites …
Romney defeats Gingrich in US spam primaries
Mitt Romney, the former Massachusetts governor who’s leading polls in the race to become the Republican Party’s nominee for the US presidency, is also the favorite …
Free online privacy tool
Abine released Do Not Track Plus (DNT+), a tool that makes it easy for anyone to see when they’re being tracked online and stop being profiled by social networks, large …
MasterCard and Silver Tail Systems combat online fraud
MasterCard and Silver Tail System announced a relationship that will enable merchants to differentiate fraudsters from legitimate consumers in real-time during the online …
Making Embedded Systems
Embedded systems control many devices in common use today, from digital watches and iPods to traffic lights and the systems controlling nuclear power plants. Since …
Top reasons for IT layoffs in 2011
Based on the data obtained with the help of a data leakage control system, and an in-depth analysis of work time usage by staff, the specialists of Falcongaze analytical …
The evolution of targeted attacks and exploit kits
There’s been a significant growth in cybercrime, via sophisticated targeted attacks and social media scams, as well as a rise in malicious email attachments, despite a …
Apple iWork passwords cracked
ElcomSoft can now recover passwords protecting Apple iWork documents. This makes Distributed Password Recovery the first tool to recover passwords for Numbers, Pages and …
ISO 27001 benefits: How to obtain management support
As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …
Cybercriminals tailoring tactics for maximum appeal
GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …
Web app security scanner Netsparker 2.1 released
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
Building Resilient IP Networks
More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware