Help Net Security
Top 3 reasons businesses should prioritize web security
2014 was a year of high-profile hacks for businesses around the world. From The Home Depot breach to the recent Sony data leak, it seemed like as soon as one data breach was …
The one compliance lesson you need to learn
We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. At the same time, we have seen an influx …
NETGEAR ReadyNAS 200 enables data protection
NETGEAR is expanding its family of NAS devices with the performance-driven ReadyNAS 200 Series for home and home office networks. ReadyNAS 200 transfers files up to an amazing …
Kensington unveils thinnest security lock for ultrabooks and tablets
Kensington announced the MiniSaver Mobile Lock, the thinnest security lock system with the Kensington mini security slot technology – for use on ultra-thin mobile …
Toshiba releases FlashAir III wireless SD card
Toshiba introduced the FlashAir III wireless SD card, a third generation memory card that serves as its own wireless LAN access point, allowing users to share images, videos …
Rails security scanner Brakeman 3.0.0 released
Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at …
Four cyber security risks not to be taken for granted
It’s pretty difficult to make information security predictions, and even more difficult to verify them afterwards: we can only judge the effectiveness of information …
Identity theft for dummies
It happened again. Checking into the hotel, I was asked if I can provide my credit card to cover additional expenses (not unusual). However, the receptionist simply wrote my …
Number of cyber attacks on retailers drops by half
Despite an 50 percent decline in the number of attacks against U.S. retailers, the number of records stolen from them remains at near record highs. IBM Security researchers …
The hidden dangers of third party code in free apps
Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps. When people install and use free …
Infosec: More than reindeer games
Dear Santa, As CEO of XMAS Inc., the leading manufacturing and shipping enterprise, you face extraordinary pressure to deliver joy on Christmas morning to billions of kids …
5 working days left until the deadline for compliance with PCI DSS 3.0 kicks in
Maintaining credit and debit card information on behalf of financial services clients demands the highest levels of security and customer confidence, and adhering to standards …
Featured news
Resources
Don't miss
- How AI is reshaping attack path analysis
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform