Help Net Security
Cisco estimates huge shift to the cloud by 2013
Nearly 12 percent of enterprise workloads will run in the public cloud by the end of 2013, according to Cisco. Their study found that desktop applications, email, …
What’s in store for 2011? More scams and identity theft
Unemployment, economic uncertainty and the proliferation of technology will be factors in emerging types of fraud over the next year, according to the 2011 Identity Theft …
Security Factsheets: A new look at vulnerability data
Secunia today announced their Security Factsheets, designed for those who are interested in understanding the historical development of advisories and vulnerabilities in …
Minimizing virtualization risks
With its potential to reduce expenses, drive automation and provide flexibility, virtualization has earned its way onto the board agenda and is being implemented by …
First VoIP call from space
Cisco announced the results of the latest Internet Routing in Space (IRIS) testing, marking the first-ever software upgrade of an IP router aboard a commercial satellite while …
Secure your iPad with a lock
Since iPads have no security slot, it’s hard to protect them from theft. Mac Locks has solved this problem with the iPad Lock, the first and only iPad cable lock. The …
Fake Amazon receipt generator discovered
Above, you can see a vaguely optimistic VirusTotal user summary in relation to a file that’s been doing the rounds for about a month or two, according to GFI Software. …
Is anyone in control of cloud security?
There are those who argue that the age of cloud computing is merely in the minds of the more far-sighted IT visionaries. I have even met those whose businesses are indifferent …
Snorby: Modern Snort IDS frontend
Snorby is a modern Snort IDS frontend. The basic fundamental concepts behind Snorby are simplicity and power. The project goal is to create a free, open source and highly …
Most businesses vulnerable to cache poisoning attacks
While DNSSEC adoption percentages appear to have increased dramatically by 340 percent this year, the actual number of zones that have been signed is very small: .02 percent, …
Growth in social networking, mobile and infrastructure attacks
IID released its list of the top enterprise security trends for 2011. Some specific areas that will have significant spikes in attacks are social networking, mobile, and …
Juniper Networks acquires Altor Networks
Juniper Networks has acquired Altor Networks, a provider of virtualization security technology that enables organizations to secure the virtualized world. Under the terms of …
Featured news
Resources
Don't miss
- Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable
- Rethinking AppSec: How DevOps, containers, and serverless are changing the rules
- Autorize: Burp Suite extension for automatic authorization enforcement detection
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)