Monitoring tool profiles user behavior to reveal human risk
BalaBit unveiled Blindspotter, an IT security tool that analyzes all user activity, including malicious events, occurring throughout IT systems. Blindspotter features …
Rapid7 releases Nexpose Ultimate
Rapid7 released Nexpose Ultimate, a vulnerability management solution that combines assessment of vulnerabilities and controls, vulnerability validation, and prioritized …
First secure external HDD with cloud management
Imation announced a high-security, high-performance external USB 3.0 SuperSpeed hard drive capable of being managed in the cloud. Using a single centralized, cloud-based …
A walk through Cyber Security EXPO 2014
Co-located with IP EXPO Europe, a cloud and IT infrastructure event, Cyber Security EXPO is taking place this week in London. Help Net Security is at the event, and …
133 DDoS attacks over 100Gbps so far in 2014
Arbor Networks released global DDoS attack data for Q3 2014 showing a remarkable increase in Simple Service Discovery Protocol (SSDP) reflection attacks. Arbor monitored very …
Bugzilla bug that could reveal other software flaws has been patched
A critical security vulnerability in the popular online bug-tracking-and-testing tool Bugzilla has been patched, and users are advised to update to new releases as soon as …
Infected ATMs give away millions of dollars without credit cards
Kaspersky Lab performed a forensic investigation into cybercriminal attacks targeting multiple ATMs around the world. During the course of this investigation, researchers …
Windows 10 will not come with built-in keylogging capabilities
In case you missed it, a big fuss has been raised about the keylogging and other “spying” capabilities of the recently released Technical Preview version of …
How does spam affect your business?
68% of organizations have seen their day-to-day business operations severely disrupted or completely stopped as a result of at least one spam-related incident in the last year …
Yahoo says its servers weren’t Shellshocked
After researcher Jonathan Hall’s claims that a group of hackers has been exploiting the Bash Shellshock vulnerability to compromise a number of servers belonging to …
Android browser SOP bypass bug: Who’s affected, and what to do?
A security researcher has recently discovered not just one but two vulnerabilities in the Android Open Source Project (AOSP) browser that could allow attackers to bypass the …
Every fifth Android user faces cyber attacks
A total of 1,000,000 Android device users around the world encountered dangerous software between August 2013 and July 2014, according to the results of a survey carried out …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)