Help Net Security
Mark Zuckerberg’s Facebook page hacked
An unknown hacker broke into the 26-year-old internet celebrity’s Facebook account and posted a bizarre message calling upon the firm to adopt a social cause: “Let …
Riskiest social media applications
The fastest growing threat to corporate networks is web-based social media applications, according to WatchGuard security researchers. These applications can seriously …
Hedge funds unprepared for cyber attack
With details trickling in about how the sophisticated Stuxnet computer worm derailed years of work on Iran’s nuclear program, many seasoned observers are left to wonder …
Automated backup service for Google Apps
Backupify announced One-Click Restore for critical data stored in Gmail, Google Docs, Google Calendar and Google Contacts accounts. Over three million businesses and …
Finalists announced for the “Most Innovative Company at RSA Conference 2011” contest
RSA Conference announced the top 10 finalists for its “Most Innovative Company at RSA Conference 2011” contest, part of its half-day Innovation Sandbox program. …
A good decade for cybercrime
For Internet users, it has been a decade of exciting online advances that allow people to communicate, share information and conduct business in ways that were never before …
PayPal most phished, Facebook most blocked
OpenDNS released statistics about which websites were commonly blocked — and which websites users were frequently given access to — in 2010. The report additionally details …
Decisive factors for designing resilient networks
The resilience of data networks is vital for the economy and society. Yet, abnormal but legitimate traffic, malicious attacks, accidents or human mistakes, and technical …
Man tries to work for CIA in order to spy for China
Glenn Duffie Shriver from Michigan was sentenced to 48 months in prison for conspiring to provide national defense information to intelligence officers of the People’s …
All-in-one home online security from Kaspersky
Kaspersky Pure Total Security provides central management to easily maintain the security of multiple PCs from a single PC: Run all scans, updates, and backup tasks …
Internet porn still main source of threats
A significant 63% of the users attempting to find adult content on their computers compromised their computers’ security on multiple occasions, according to BitDefender. …
The vulnerability species: Origin and evolution
There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems