Help Net Security
Mobile banking security for Android
Webroot has announced it is extending mobile security applications to its partners in banking in order to protect their customers who use tablets and smartphones to conduct …
Granular access to encrypted data in the cloud
Newline Software announced the release of OPTIC, Online Privacy Technology In the Cloud. The solution allows developers to securely query, write, and read encrypted data to …
Spear-phishing and crimeware assembling marked second half of 2010
The Anti-Phishing Working Group (APWG) reports that the development of crimeware surged in the half-year period ending in December, 2010 with one data contributor registering …
Metasploit module for imitating Cisco devices
SecureState announced the release of the CDP tool, an additional module for the Metasploit Framework, this time for forging Cisco Discovery Protocol frames. The Cisco …
A unique malware file is created every half-second
Sophos has released its Mid-Year 2011 Security Threat Report, which reveals that since the beginning of 2011, the company has identified an average of 150,000 malware samples …
Testing the cloud
Managing IT networks requires a broad set of competencies in a growing number of technologies and products. It therefore makes sense that these competencies are centralized in …
Week in review: Massive iFrame injection attack, Anonymous/LulzSec arrests and Facebook phishing
Here’s an overview of some of last week’s most interesting news and articles: Global analysis of 10 million web attacks Web applications, on average, experience …
Web app security scanner Netsparker 2.0 released
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
Norman antimalware appliance built on Linux platform
Norman announced the latest version of its Network Protection (NNP) antimalware appliance, which improves protection against persistent IT infrastructure security attacks. New …
IT control objectives for cloud computing
Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …
Use Google’s indexing capabilities to identify vulnerabilities
Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …
What did the RSA breach end up costing EMC?
RSA, the security division of EMC Corporation, has suffered a breach of its networks and the loss of critical data back in March. An initial refusal of sharing details of the …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware