Help Net Security
Week in review: How GitHub is redefining software development, Glibc bug, drone-hijacking malware
Here’s an overview of some of last week’s most interesting news, interviews and articles: VPN services blocked by China’s Great Firewall A number of popular …
Nearly half of all DDoS attacks use multiple attack vectors
Akamai released a new security report that provides analysis and insight into the global attack threat landscape including DDoS attacks. Akamai observed a 52 percent increase …
How to determine if insiders should be your primary concern
We learned throughout our lives that if we experience the same problem over and over again in a certain situation, we should probably change something in our own behavior / …
How people perceive online privacy
A new study by the National Cyber Security Alliance shows that Americans care deeply about their privacy. While a great knowledge gap exists about how information is collected …
What IT workplace issues keep CIOs awake at night?
What worries chief information officers (CIOs) and IT professionals the most? According to a recent survey by Sungard AS, downtime and talent acquisition weigh heaviest on …
Guidance to improve risk management and IoT
As connected devices infiltrate the workplace—some with IT’s knowledge and some without—both value and risk can increase significantly. ISACA has released new guidance …
How much can a DDoS attack cost your organization?
A DDoS attack on a company’s online resources might cause considerable losses – with average figures ranging from $52,000 to $444,000 depending on the size of the …
Market share of antivirus vendors and products
A new report from OPSWAT determined the market share for the top five antivirus vendors with RTP enabled. It includes: Avast – 21.4% Microsoft – 19.4% AVG – …
Companies need to be custodians of customer data, not owners
When U.S. President Barack Obama recently called upon education service providers to safeguard student privacy by following a set of commitments regarding the collection, …
Reactions to the serious vulnerability found in Glibc
The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …
How important is online privacy?
Consumer online privacy concerns remain extremely high with 92 percent of American internet users worrying to some extent about their privacy online – the same …
4 tips to make data protection everyone’s business
Most people wrongly assume that the burden of protecting workplace data across laptops, tablets and smartphones falls solely on your IT department. Without active observance …
Featured news
Resources
Don't miss
- 7-Zip vulnerability is being actively exploited, NHS England warns (CVE-2025-11001)
- Exam prep hacked: Study tips and tricks that really work
- Stealth-patched FortiWeb vulnerability under active exploitation (CVE-2025-58034)
- Threat group reroutes software updates through hacked network gear
- The long conversations that reveal how scammers work