Help Net Security
How much can a DDoS attack cost your organization?
A DDoS attack on a company’s online resources might cause considerable losses – with average figures ranging from $52,000 to $444,000 depending on the size of the …
Market share of antivirus vendors and products
A new report from OPSWAT determined the market share for the top five antivirus vendors with RTP enabled. It includes: Avast – 21.4% Microsoft – 19.4% AVG – …
Companies need to be custodians of customer data, not owners
When U.S. President Barack Obama recently called upon education service providers to safeguard student privacy by following a set of commitments regarding the collection, …
Reactions to the serious vulnerability found in Glibc
The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …
How important is online privacy?
Consumer online privacy concerns remain extremely high with 92 percent of American internet users worrying to some extent about their privacy online – the same …
4 tips to make data protection everyone’s business
Most people wrongly assume that the burden of protecting workplace data across laptops, tablets and smartphones falls solely on your IT department. Without active observance …
Multiple vulnerabilities in the FreeBSD kernel code
Francisco Falcon from the Core Exploit Writers Team found multiple vulnerabilities in the FreeBSD kernel code that implements the vt console driver (previously known as …
IBM’s sophisticated cryptographic algorithm protects your identity
IBM researchers revealed plans for a cloud-based technology, called Identity Mixer, that uses a cryptographic algorithm to encrypt the certified identity attributes of a user, …
Threats and technologies of a shifting data security landscape
With every email now a target and every piece of data at risk, the need for data protection maturity has never been higher. According a new study released by Lumension, IT …
IoT security and privacy best practices
In a report on the Internet of Things (IoT), the staff of the Federal Trade Commission recommend a series of concrete steps that businesses can take to enhance and protect …
High severity vulnerability found in Linux GNU C library
The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …
Supposedly clean Office documents download malware
Bitdefender is warning Microsoft Office users against the emergence of a new spam campaign that is looking to trick antispam filters in order to allow spam to pass freely into …