Read more about HP
Bookmark and Share
  • HP unveils community-sourced threat intelligence platform

    19.09.2013

    HP announced HP Threat Central, a community-sourced security intelligence platform that will enable automated, real-time collaboration between organizations to combat advanced cyber threats.

  • Self-healing BIOS security from HP

    18.09.2013

    HP announced HP BIOSphere with SureStart technology, a self-healing security solution created to help organizations better manage risk and protect user and IT productivity.

  • HP releases Fortify Static Code Analyzer 4.0

    29.08.2013

    HP announced Fortify Static Code Analyzer (SCA) 4.0, delivering a new approach that enables organizations to assess the security of software up to 10 times faster than previous versions of the solution through more accurate and parallelized static application security testing.

  • Malicious HP scan notifications target employees

    09.04.2013

    Users are once again being targeted with fake notifications about a scanned document, but instead of attaching a malicious file to the email, malware peddlers have opted for including a link to a site serving malware: The email's headers have been spoofed to make it look like the message was sent by a printer inside the victim's enterprise, and the fact that the crooks chose the HP brand is accidental - they could have just as easily have used - and have in the past - Xerox, Lexmark or any other popular brand of printers, scanners, or photocopiers.

  • New HP server for social, cloud and big data

    09.04.2013

    HP unveiled the HP Moonshot system, delivering new infrastructure economics by using up to 89 percent less energy, 80 percent less space and costing 77 percent less, compared to traditional servers.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //