Help Net Security
IT security is a matter of accountability
For today’s CEO, being the victim of criminal hackers is no longer just a source of embarrassment. Being hacked often carries legal ramifications and can even cost you …
70% of IT pros experience weekly phishing attacks
69 percent of IT professionals experience phishing attacks at least once a week, with customer data cited most often as the type of data attacked, followed by financial …
eBook: BYOD Policy Roadmap
Every business needs a clearly articulated position on BYOD, even if it chooses not to allow for it. What’s your position? Do you even have one? If you’re …
Week in review: PoS security, the Black Hat Arsenal, and securing the U.S. electrical grid
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Securing the U.S. electrical grid The Center for the Study of …
Patching: The least understood line of defense
When it comes to security, only a total dope doesn’t understand firewalls, anti-virus and at least the basics of passwords. But how many end users, indeed how many IT …
A closer look at Acunetix Web Vulnerability Scanner
Acunetix Web Vulnerability Scanner automatically checks your web applications for SQL Injection, XSS and other web vulnerabilities. Features: AcuSensor Technology SQL …
Phishers targeting crypto currency and retail sites
Online payment services and crypto-currency sites are being targeted by phishers. The number of phishing attacks remained high, and the second quarter of 2014 saw the …
5 things infosec can learn from adventure games
As an active adventure gamer and a natural seeker of reusable patterns, I’ve noticed that some of the things I do to achieve success in video games can be applied to …
70% of finance apps vulnerable to input validation attacks
A growing number of data breaches and security incidents can be directly linked to poor code quality, according to CAST. The data reveals finance and retail industry …
10 most significant software security design flaws
The IEEE Center for Secure Design, a cybersecurity initiative focused on the identification of software design flaws, released a report based on real-world data collected and …
Why every security-conscious organization needs a honeypot
You’ve probably heard the phrase about “canaries in a coal mine.” In the mid 1900s, a guy named John Haldane figured out that birds die pretty quickly when …
Former HHS cyber security director convicted for child porn
The former acting director of cyber security at the U.S. Department of Health and Human Services was convicted by a federal jury in the District of Nebraska of engaging in a …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground