Help Net Security
Week in review: Leaking Facebook apps, Chrome sandbox cracked and explosion of Android malware
Here’s an overview of some of last week’s most interesting news, interviews, videos and articles: Files uploaded to file hosting services accessed by malicious …
Tips for guarding against mobile malware threats
In order to guard against growing mobile malware threats, Juniper Networks offers the tips below. For consumers: Install an on-device anti-malware solution to protect against …
Phishing attacks rise year over year
Phishing attacks in Q1 2011 increased significantly compared to Q1 2010, according to IID. Criminals utilized phishing scams 12 percent more from January to March 2011 than …
HP Intelligent Management Center multiple vulnerabilities
Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …
Free credit and identity theft protection service
TrustedID launched IDSafe, a free consumer credit and identity theft protection service to provide core coverage at absolutely no cost. IDSafe provides consumers a free credit …
WatchGuard introduces next-generation firewall
WatchGuard unveiled its most powerful security appliance, the XTM 2050. This next-generation firewall (NGFW) providessecurity for large organizations and data centres that …
Explosive financial malware targets Windows
Trusteer identified Sunspot, a little known Windows malware platform that has been in circulation for some time, but was never previously recognized for its financial fraud …
Protect, share and sync data remotely
Trend Micro announced SafeSync for Business to help even the smallest companies securely save, manage and access their digital files from anywhere at any time, while …
Visa unveils new payments solutions
Visa today announced the next generation of payments solutions that include a secure cross-channel digital wallet and a range of customized mobile payments services. The …
BackTrack 5 released
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
Exponent CMS multiple vulnerabilities
Multiple vulnerabilities have been discovered in Exponent CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks and disclose sensitive …
Majority not prepared for IPv6 transition
88% of business networks were not fully ready for a change to IPv6, with two thirds (66.1%) saying their networks are only 0-20% ready, despite the fact that the last blocks …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised