Help Net Security
IT’s strategic contribution increases in uncertain economic times
In the midst of a belief that tough times lie ahead, more boards of directors are saying that they expect a high to extremely high strategic contribution of IT in 2012, …
Free return on security investment calculator
The Information Security & Business Continuity Academy launched its free Return on Security Investment (ROSI) calculator (registration required). This calculator provides …
New book: MCTS Self-Paced Training Kit
Fully updated for Windows Server 2008, this 2-in-1 Training Kit delivers in-depth exam prep, including self-paced lessons, exercises, and review, practice tests on CD, and an …
Week in review: IMF breach, Bitcoin-stealing Trojan and the 10 most common iPhone passcodes
Here’s an overview of some of last week’s most interesting news: Foreign government behind IMF breach and data theft? The International Monetary Fund’s …
Protect yourself from Olympic phishing scams
Nobody yet knows for certain whether they have been allocated 2012 Olympic event tickets. Until June 24, when confirmations arrive, there remains the risk that some people …
SpyEye Trojan attacks Air Berlin and AirPlus travelers
Trusteer have uncovered a SpyEye configuration that targets users of two leading European airline travel Web sites: Air Berlin, the second largest airline in Germany (after …
Microsoft investigates emerging Internet phone scam
An Internet scam that targets English-language markets and costs victims on average $875, according to Microsoft. The scam works by criminals posing as computer security …
Risk management under pressure
Has the financial services industry reached a comfort zone, placing it in jeopardy of another crisis? Are today’s risk management practices and reporting in tune with …
Protect yourself while surfing the mobile web
Lookout Mobile Security introduced Safe Browsing to protect against online threats when surfing the Web from a mobile device. Safe Browsing users can feel confident that they …
F-Secure Mobile Security 7 protects smartphones and tablets
The mobile world is changing fast. Smartphones and tablet computers are at the cutting edge of technological sophistication and defining what is cool to a new generation of …
Adobe Shockwave player multiple vulnerabilities
Multiple vulnerabilities have been reported in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. …
Malware activity hitting peaks of 10 million pieces per day
Virus and malware activity increased during the month of May, sporadically hitting peaks of more than 10 million pieces per day, according to AppRiver. Major news events, once …
Featured news
Resources
Don't miss
- CERT UEFI Parser: Open-source tool exposes UEFI architecture to uncover vulnerabilities
- Why prevention-first secrets security will define enterprise scale: Learnings from a leading telecom
- Fortinet starts patching exploited FortiCloud SSO zero-day (CVE-2026-24858)
- Attackers use Windows App-V scripts to slip infostealer past enterprise defenses
- Microsoft reveals actively exploited Office zero-day, provides emergency fix (CVE-2026-21509)