90% of employees use personal devices for work
IT managers feel they lack the necessary tools to properly manage personal devices. A new survey by DELL Kace revealed 87 percent of companies have employees that use some …
McAfee introduces anti-rootkit security beyond the OS
Cybercriminals know how to evade current operating systems-based security, demanding a new paradigm – security beyond the operating system. On that note, McAfee …
Light Patch Tuesday fixes 15 vulnerabilities
In today’s Patch Tuesday, Microsoft delivers 5 security bulletins (all rated “important”) that address 15 vulnerabilities affecting Windows, Microsoft Office …
Botnet masters are spreading their resources
With the takedown of the Pushdo/Cutwail, Bredolab and Rustock, the number of “zombified” US computers has decreased so much that the country is no longer …
Vending machine company breach results in massive credit card data theft
Credit and debit card data of some 40,000 people who visited the Wilderness Resorts water parks in Wisconsin and Tennessee from December 12, 2008 to May 25, 2011 has been …
Win a free ticket to the Gartner Security & Risk Management Summit
The Gartner Security & Risk Management Summit 2011 is scheduled to be held in London on September 19 and 20, and Help Net Security is offering a free ticket to the event …
Improved SpyEye variant actively attacking Android devices
The first SpyEye variant, called SPITMO, has been spotted attacking Android devices in the wild. According to Amit Klein, Trusteer’s chief technology officer, the threat …
Enterprise-level management and control of SSL certificates
Managing Secure Sockets Layer (SSL) certificates is critically important for enterprises and is becoming a larger challenge, especially due to the skyrocketing number of …
Facebook tool automates syphoning of user data
A group of security researchers has developed a proof-of-concept Java-based tool that could allow malicious individuals to automatize the syphoning of information from a …
Bogus “last words” Facebook app offer leads to malware
Humans have many impulses and fears, and cyber crooks can be counted on exploiting each and every one of them for achieving their purposes. The latest example of this has been …
Secure corporate email archiving solution
According to The Radicati Group, the average corporate employee will send and receive about 112 email messages per day in 2011 and this volume will continue to grow. Many of …
HP expands its Enterprise Security Solutions portfolio
HP expanded its Enterprise Security Solutions portfolio to help enterprises establish and execute a comprehensive security strategy to deal with threats resulting from the …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services