Help Net Security
SAP NetWeaver multiple vulnerabilities
Digital Security Research Group has reported multiple vulnerabilities in SAP NetWeaver, which can be exploited by malicious users to conduct script insertion attacks, …
Study of next-generation firewall deployments
The results of a Ponemon Institute survey show 55 percent of users globally, and 64 percent in the U.S., are leveraging next-generation firewalls to augment their current …
Joomla! security bypass weakness and XSS vulnerability
A weakness and a vulnerability have been reported in Joomla!, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site …
Security threats to expand in 2012
Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their …
Top five tips to avoid bad apps
While reported mobile malware incidents are still relatively low in number, McAfee Labs is seeing significant growth in the mobile malware threat landscape. Due to the fact …
IBM unveils mobile security service
IBM unveiled its Hosted Mobile Device Security Management service that helps organizations protect against data loss and other risks caused by device theft, unauthorized …
Week in review: Cell phone money laundering, hardware Trojans and iOS flaw that allows downloading of malicious code
Here’s an overview of some of last week’s most interesting news and articles: Browser bloat and privacy concerns An increase in browser-based bloat and malware, …
100% of enterprises reported cyber attacks
Attacks are becoming more difficult to defend against and are expensive to mitigate, with traditional safeguards falling short, according to F5 Networks. With both …
Entry VPN client for Windows
NCP engineering announced Secure Entry Client 9.3, its entry VPN client for Windows which supports mobile broadband in Windows 7 and Internet Key Exchange version 2 (IKEv2). …
Integrate security and risk management: TOGAF and SABSA
There is a new free guide that enables enterprise and security architects to integrate security and risk management approaches into enterprise-level architectures. Endorsed …
Cybercriminals exploiting user inexperience
Noteworthy threats in October 2011 included the return of a rogue web browser, a phony hacking tool for Gmail account password recovery and malware disguised as advertisements …
Norman releases endpoint protection system
Norman released Endpoint Protection 9, which stops all kinds of malware threats including viruses, worms, trojans, spyware, adware, bots, zero-day threats and rootkits. …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance