Help Net Security
Malware targeting Android jumps 76 percent
The amount of malware targeted at Android devices jumped 76 percent since last quarter, to become the most attacked mobile operating system, according to McAfee. 2011 has also …
$100,000 for open source security projects
Rapid7 created a $100,000 investment fund to support up to seven promising open source projects in the security industry. The “Magnificent7” projects will be …
One click away from digital disaster
61 percent of consumers click on links while online that take them to unexpected places, making them vulnerable to cyberattacks that can lead to identity theft, according to …
Ramnit worm uses Zeus Trojan tactics for banking fraud
Trusteer discovered the 18 month old file infecting worm Win32.Ramnit has morphed into financial malware and is actively attacking banks to commit online fraud. Ramnit …
Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities have been reported in Google Chrome, where some have unknown impacts and others can can be exploited by malicious people to bypass certain security …
Privacy screen protection for iPhone and iPad
3M released its range of protection films optimized for tablet PCs and the Apple iPhone. The range consists of two product lines, one delivers visual security from prying eyes …
The Basics of Information Security
As part of the Syngress Basics series, The Basics of Information Security will provide the reader with fundamental knowledge of information security in both theoretical and …
ShredIt X 6 for Mac OS X released
Mireth Technology released ShredIt X 6, its file shredder and hard drive cleaner software for Mac OS X. ShredIt X can be used to erase files, folders, disk free space, …
Week in review: First flaws detected in the AES, Android malware and Internet bad neighborhoods
Here’s an overview of some of last week’s most interesting news and articles: Third-party Firefox add-ons to be blocked automatically Mozilla has decided to put a …
Strategies for effective data analytics
Organizations with effective data analytics can make stronger business decisions by learning what is working and what is not, what they are doing well, and where they need …
Emerging threats: Attacks via MIPS devices
First of all, if something has already been invented and has been seen in-the-wild more than once, it’s very likely to occur again and again, especially if the attacks …
Confidence in online retailers sinks
According to a study of consumer sentiment toward online shopping and security by McAfee, only about a third of online consumers believe that most websites are safe for …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)