Help Net Security
Research unveils improved method to let computers know you are human
CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the …
ReversingLabs extracts malicious files from network traffic
ReversingLabs announced the N1000 Network File Threat Sensor appliance that employs Active Decomposition and Predictive Detection technologies to detect threats in files …
Whitepaper: Social networking and security risks
The popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be …
Week in review: Hackers don’t worry about repercussions, malware targets iOS devices, Nest thermostat as a spying device
Here’s an overview of some of last week’s most interesting news, interviews, videos, podcasts, reviews and articles: The art and science of detecting emerging …
Infographic: Honeypot cloud security data
New infographic data on hackers reveals that Russia stealing passwords is the least of our cyber worries. Recent data reveals that China and India are attacking U.S. servers …
86% of hackers don’t worry about repercussions
Thycotic announced the results of a survey of 127 self-identified hackers at Black Hat USA 2014. The survey found that 86% of hackers are confident they will never face …
Is your encryption getting out of control?
2014 marks the 25th anniversary of the creation of the World Wide Web. From its earliest beginnings, users have demanded security for their sensitive information and web sites …
IT has no choice but to embrace BYOD
Bring-Your-Own-Device (BYOD) and Bring-Your-Own-App (BYOA) trends started as a clandestine effort by employees to work more efficiently and grew rapidly. Since they …
Encore Networks launches ultra-low cost wireless VPN router
Encore Networks launched the EN-2000, an ultra-low cost wireless VPN router designed for high-availability M2M applications in fixed or portable locations supporting video …
Android backdoor lurking inside legitimate apps
One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and to stick to the official Google Play …
API security for connecting the enterprise cloud
In this interview, Don Bergal, COO at Managed Methods, answers questions regarding security around API based connections between an enterprise and the hybrid cloud. What …
A look at advanced targeted attacks through the lens of a human-rights NGO, World Uyghur Congress
In my capacity as an academic researcher at Northeastern University, I collaborated with computer scientists Stevens Le Blond, Adina Uritesc and Cedric Gilbert at the Max …
Featured news
Resources
Don't miss
- Building cyber talent through competition, residency, and real-world immersion
- Browser agents don’t always respect your privacy choices
- Anubis: Open-source web AI firewall to protect from scraper bots
- Session tokens give attackers a shortcut around MFA
- AI isn’t one system, and your threat model shouldn’t be either