Help Net Security
Hardware-based enterprise key management platform
Escalating threats, expanding regulatory requirements, and the movement to cloud-based and virtualized infrastructures are driving the need for a more unified approach to …
New cloud computing credential
CompTIA and ITpreneurs are collaborating on a new cloud computing skills credential. The Cloud Essentials exam, scheduled for availability in December 2011, will validate …
Light Patch Tuesday features four bulletins
For the November Patch Tuesday, Microsoft released four bulletins that fix vulnerabilities targeting Windows. One is marked as critical, two are important, and the last one is …
Fedora 16: Cloud and virtualization features
The Fedora Project announced the availability of Fedora 16, the latest version of its free open source operating system distribution. Notable feature enhancements include: …
Unknown malware rampant in enterprise networks
New research from Palo Alto Networks shows that targeted and unknown malware are a reality in enterprise networks today, finding hundreds of unique, previously-unknown malware …
Spammers’ URL shortening sites highlight weakness of old security
A recent Web threat report warned that spammers are now using their own URL shortening servicesto lure spam recipients into clicking on malicious web links. These use the …
One in nine Internet users surfing without protection
The number of new malware strains continues to rise. G Data Security Labs counted over 1.2 million new computer malware strains in the first half of the year alone. Despite …
Framework for analyzing web-based threats
Wepawet is a framework for the analysis of web-based threats. It uses a composition of tools and techniques to execute, trace, analyze, and characterize the activity of code …
Hybrid social engineering attacks
Fraudulent phone calls are increasing in popularity. One possible use for these bogus “bank’ calls is to utilize personal identification information stolen using …
Secure access to Office 365 cloud-based web applications
RSA SecurID can now be integrated with the Windows Active Directory Federation Services 2.0 (AD FS 2.0). This integration can enable organizations to provide secure user …
Access Windows using your iPad and iPhone
Leostream Connect enables users to access secure and reliable Windows desktops and applications directly from their iOS device. This application allows an increasingly mobile …
20-fold increase in fraudulent spam
In Q3 2011, the percentage of fraudulent emails in spam traffic increased twenty times, rising from 0.1 per cent last quarter to 2 per cent of all spam traffic in Q3. The …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance