Posted on 2 July 2012. | Phoenix and Blackhole are the most popular and widely used exploit kits because their creators are always tinkering with them and pushing out update and improved attack capabilities.
Posted on 2 July 2012. | IPv6 features a 128-bit addressing scheme, supports a mind-numbing amount of devices and delivers much needed security and performance improvements.
Posted on 2 July 2012. | ISACA released COBIT 5 for Information Security, which builds on the COBIT 5 framework to provide practical guidance for those interested in security at all levels of an enterprise.
Posted on 14 June 2012. | New research reveals a growing awareness of external threats among respondents. At the same time, it is clear that everyday security issues are the main concerns occupying the IT departments time at present.
Posted on 14 June 2012. | Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the BYOD to work trend.
Posted on 13 June 2012. | SMBs are struggling to keep IT infrastructures up to date with current working practices and more advanced
Posted on 29 January 2013. | Arbor Networks released its 8th Annual Worldwide Infrastructure Security Report offering a rare view into the most critical security challenges facing todays network operators.Posted on 29 January 2013. | Imperva announced a new report which examines the dangers of third-party code in cloud computing.Posted on 28 January 2013. | The past 12 months have been, to say the least, an active time for the information security landscape in Europe.Posted on 28 January 2013. | Help Net Security put SafeNet's new President and CEO in the hot seat to learn more about his background, as well as future plans.Posted on
Posted on 15 October 2012. | Incapsula is a cloud-based service that provides seamless enterprise-level security protection and performance optimization for web sites.Posted on 11 October 2012. | The information security industry is facing an inflationary spiral, which is both unsustainable and bad for the economy as the skills gap in information security continues to widen.Posted on 10 October 2012. | The Zscaler Application Profiler is a free online tool that makes it easy for users to assess mobile apps for security risks.Posted on 9 October 2012. | What should have been a relaxing and afternoon in the virtual world of Azeroth turned
Posted on 18 July 2012. | European Dropbox users have been inundated with spam advertising gambling websites, prompting speculations about a possible breach of the company's systems.
Posted on 18 July 2012. | Kaspersky Lab researchers announced the results of a joint-investigation with Seculert regarding Madi, an active cyber-espionage campaign targeting victims in the Middle East.
Posted on 18 July 2012. | With the latest Firefox release, Mozilla has fixed a slew of security vulnerabilities, including five deemed critical that may have allowed hackers to run attacker code and install
Posted on 17 September 2012. | RSA Conference Europe 2012 is scheduled to be held in London on October 9-11, and Help Net Security is offering a free ticket to the event for one lucky reader.Posted on 14 September 2012. | While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from Julys 77.34 per cent, June kick-started what would later be discovered to be an avalanche of adware.Posted on 14 September 2012. | The PCI Security Standards Council released best practices for mobile payment acceptance security.Posted on 13 September 2012. | A new version of BlackHole, one of the most popular exploit kits out there,
Posted on 4 December 2012. | PhishMe predicts that phishers will be changing their tactics in 2013 resorting to targeted spear phishing emails rather than the mass mails of the past.Posted on 4 December 2012. | This is a guide for managers who want to learn about cybersecurity and discover how to create and implement a plan to protect their organization.Posted on 3 December 2012. | The law created to protect children's online privacy actually increases risk, according to new research from Polytechnic Institute of New York University.Posted on 3 December 2012. | Large numbers of employees use Dropbox and other consumer file sharing services
Posted on 15 August 2012. | A significant drop-off in externally reported security issues has been taken as a signal and the people behind the project decided to introduce some changes to the reward structure.
Posted on 15 August 2012. | Prolexic Technologies exposed weaknesses in the C&C architecture of the Dirt Jumper DDoS Toolkit family that could neutralize would-be attackers.
Posted on 14 August 2012. | Malware development has long stopped being the exclusive domain of individuals and groups looking for strictly fame or money.
Posted on 14 August 2012.
Posted on 22 February 2013. | Check Point uncovered the major security risks and threats that impact organizations worldwide.Posted on 22 February 2013. | In the past year, 75 percent of mobile phishing URLs were rogue versions of well-known banking or financial sites, warns Trend Micro.Posted on 21 February 2013. | McAfee Labs revealed that sophisticated attacks originally targeting the financial services industry are now increasingly directed at other critical sectors of the economy.Posted on 21 February 2013. | The goal of these attacks is simple, but the techniques the attackers use and the speed and determination with which they
Posted on 17 August 2012. | Organizations face ever-stricter regulatory and security requirements to protect data. But user provisioning systems alone cannot meet these needs because they do not provide an enterprise-wide view of user entitlements in a view business managers can understand.
Posted on 16 August 2012. | Google has announced that it will increase the prizes given out to successful participants of its Pwnium competition.
Posted on 16 August 2012. | NSS Labs testing showed that 9 of 13 popular consumer anti-virus products tested failed to provide adequate protection against
- Digital Disruption - E2 Conference Boston
- The Language of UX: Beyond Buzzwords -
- Delve into technologies and business issues around mobile payments and wallets - Mobile Commerce World - Mobile Commerce World
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
- Mobile Connect - E2 Conference Boston - E2 Conference Boston
- The Untapped Potential of Mobile Apps for Commercial Customers
- The Next Generation ESB: Why Integration is the Foundation for Better Business
- Secure Cloud: Taking Advantage of the Intelligent WAN
- Augment your data warehouse with big data solutions
- Real-Time Analytics: Big Data. Real Answers. Big Impact.
This Week's Issue
Free Print SubscriptionSubscribe
Current Government Issue
- The Government CIO 25: These influential and accomplished government IT leaders are finding ways to be cost efficient and still innovate.
- Rethink Video Surveillance: It's not just about networked cameras anymore. New technology provides analytics, automation, facial recognition, real-time alerts and situational-awareness capabilities.
- Read the Current Issue