Help Net Security
Security concerns around “backdoor” mobile devices
Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …
Malvertising attacks surge
Malvertising is on a significant rise, having doubled from Q3 to Q4 2010, according to Dasient. Based on Q4 estimates, three million malvertising impressions were served per …
Tough questions about botnets
ENISA published a comprehensive study on the botnet threat and how to address it. The report looks at the reliability of botnet size estimates and makes recommendations for …
Metasploit Pro 3.6 released
Metasploit brings an enhanced command-line feature set for increased proficiency and detailed PCI reports with pass/fail information for a view of compliance posture with PCI …
Security framework integrates forensics and data auditing
AccessData announced the initial release of its new integrated security framework, CIRT (Cyber Intelligence and Response Technology), and is inviting select government and …
SonicWALL releases Continuous Data Backup 6.0
SonicWALL launched CDP 6.0 which automatically preserves and protects data assets against loss from file, device, and location based disasters. With support for Windows, Linux …
The importance of metadata to prevent data leaks
A new IDC report highlights how the widespread use of collaborative content technologies is fueling the aggressive growth of unstructured and semi-structured data. While …
Security considerations bring Software-plus-service and Software as a Service to the enterprise
Software-plus-service (S+S) and Software-as-a-service (SaaS) are next-generation software solutions for a number of today’s applications. Implementation flexibility, …
Risk management cookbook
The Open Group Security Forum completed a major risk management initiative with the publication of the Cookbook for ISO/IEC 27005:2005 (registration required). The cookbook is …
Week in review: Trojan on official Android market, reset Gmail accounts and backdoor Mac OS X Trojan
Here’s an overview of some of last week’s most interesting news and articles: Moldovan fraud ring mastermind arrested A coordinated effort of the Irish gardai and …
Trojans still top malware threat
Continuing a trend observed since last summer, the same types of Trojan horse programs have persistently dominated the threat landscape through February, according to GFI …
Simple protection steps from credit card fraud
Every year, cybercriminals steal billions of dollars from unsuspecting computer users and companies by committing credit card fraud. Although this activity was once relegated …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)