Trojanized Netflix app steals account login credentials
When Netflix released an Android client app earlier this year, it also witnessed the attempts of various app developers who tried to make a pirated copy of it work on other …
Security pros say that hackers have the upper hand
The numbers don’t lie: now, more than ever, security professionals feel outgunned by attackers and the level of automation employed in most campaigns against enterprise …
Cyber threat defense, detection and response platform
LogRhythm announced LogRhythm 6.0, an evolution to its SIEM 2.0 security intelligence platform with significant innovations in cyber threat defense, detection and response. …
Website reputation and automatic blacklisting enhance GFI WebMonitor
GFI announced that GFI WebMonitor now includes new security and anti-malware features that enable small and medium-sized businesses to provide employee Internet access without …
Verisign asks for ability to suspend domains without a court order
Verisign, the operator for all .com, .net, and .name top-level domain, has submitted a request to ICANN asking for the power of taking down “abusive” domains …
40% of SMBs suffered breach due to unsafe Web surfing
40 percent of small and medium-sized businesses have suffered a security breach due to unsafe web surfing, and nearly one-third still do not have a policy to govern the use of …
Network security platform for multiple X-Series deployments
Crossbeam announced that it has expanded its family of X-Series network security platforms with the X50, a new platform that enables larger IT organizations with multiple …
90,000 accounts compromised in new Sony attack
60,000 PlayStation Network and Sony Entertainment Network accounts and 33,000 Sony Online Entertainment accounts have been compromised during what Sony describes as a testing …
Photos: The look and feel of RSA Conference Europe 2011
Help Net Security is attending RSA Conference Europe 2011 in London this week. Here’s an overview of the event in photos. Art Coviello, Executive Vice President, EMC …
Two state-sponsored groups responsible for RSA breach
Two distinct groups were behind the March attack against RSA’s networks, said RSA president Tom Heiser, and they seem to have been directed in their efforts by a single …
Large-scale spam campaign uses compromised webmail accounts and WordPress sites
A spam campaign currently under way has been spotted coming from several thousand compromised Yahoo!, AOL and Hotmail email accounts and taking advantage of compromised …
Invisible authentication for mobile applications
RSA announced the release of software developer kits (SDKs) designed for mobile application developers to seamlessly integrate strong one-time password (OTP) or risk-based …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains