Help Net Security
Malicious QR codes and the persistence of rootkits
Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …
Endpoint security through whitelisting
The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise. This feature …
Computer Security Fundamentals, 2nd Edition
This book brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. It …
Organizations to replace BI functions with cloud offerings
Nearly one third of organizations either already use or plan to use cloud or software-as-a-service (SaaS) offerings to augment their core business intelligence (BI) functions, …
“Chuck Norris is dead” Facebook scam
Chuck Norris, the popular martial artist/ actor whose “tough guy” image has spawned a countless jokes and memes on the Internet, has been killed off by Facebook …
Carberp Trojan targets French broadband subscribers
Last year, Carberp emerged on the online banking fraud scene as a competitor to the dominant financial malware platforms Zeus and SpyEye. Trusteer recently discovered a …
Securely upload data to the AWS cloud
Amazon announced AWS Storage Gateway, a service that provides a new option to securely upload data to the AWS cloud. The AWS Storage Gateway connects an on-premises software …
Targeted attacks will change the economics of security
Today, European Justice Commissioner, Viviane Reding, will unveil the new European Privacy Directive, designed to safeguard personal, identifiable information that is stored …
IT industry business confidence remains flat
IT companies express tempered optimism heading into the first quarter of the year, though longer-term prospects look more promising. CompTIA projects a worldwide IT industry …
Cloud-based fuzzing for zero-day vulnerability discovery
Codenomicon released the Fuzz-o-Matic cloud-based software security Testing-as-a-Service (TaaS) platform for enterprise software and applications running on Windows, Linux, …
Comprehensive Java testing solution
Parasoft introduced a new release of Parasoft Jtest: a comprehensive Java testing solution that automates static analysis, unit testing, coverage analysis, runtime error …
Google+: The Missing Manual
If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware