Help Net Security
Spyware prevention 101
Spyware goes by many names, including adware, malware, crimeware, scumware and snoopware, but no matter what you call it, its purpose is still the same: to creep into your …
Victorinox unveils new secure devices
Victorinox launched three new products – the Victorinox Slim, Victorinox Slim Duo and the Victorinox Secure SSD. Products are waterproof, shock resistant and available …
Cybercrime black market statistics
PandaLabs released an investigative report on the current cybercrime black market. They discovered a vast network selling stolen bank details along with other types of …
Cybercriminals shifting focus to non-Windows systems
In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, …
Zeus malware now targets online payment providers
The Zeus malware continues to evolve, diversifying away from its target bank sites and their customers, and over to sites with user credentials that allow assets that have a …
Cyber security incident management guide
The European Network and Information Security Agency (ENISA) has issued a new guide on good practice, practical information and guidelines for the management of network and …
Cloud operating system for public, private and hybrid clouds
Joyent released SmartDataCenter 6, the newest version of its cloud operating system, an integrated suite of software and services designed for service providers and …
A global shift in cybercrime
The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that …
Digital forensics for iPad and iPhone 4
The iPad, iPhone 4 and iPod touch frenzy on both the consumer and corporate fronts accelerates the need for law enforcement, security analysts and e-discovery specialists to …
Chinese Trojan targets cloud-based AV technologies
A Trojan that tries to obstruct cloud-based antivirus technology present in major AV solutions offered by Chinese security firms is targeting users by posing as a video player …
Dramatic increase in malware and phishing via social networks
By mid-2010, Facebook recorded half a billion active users, making it not only the largest social networking site, but also one of the most popular destinations on the web. …
40% of executives not planning to adopt the cloud
Forty percent of C-level executives have stated that they are not planning to adopt cloud computing, according to a report by ISACA. Respondents who do not plan to use cloud …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised