Help Net Security
What threats will dominate 2014?
Trend Micro released its annual security predictions report. The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and …
The DDoS debate: Multi-layered versus single solution
There is a DDoS debate in the cybersecurity industry about which solution is more effective – multi-layer or single. However, the argument is really more complex and …
Tech giants call for government surveillance reform
Eight Internet giants have formally urged the US president and Congress to reform and limit government surveillance, and have offered several suggestions on how to do it. AOL, …
1Password 4.1 for Mac adds new password updating, better search
Popular password manager 1Password for Mac reached version 4.1 that comes with some long-requested features, the most notable being a new Login (password) updating process. If …
Cybercrime ignorance is a serious risk
Organizations who fail to recognize the threat posed by cyber crime are putting the livelihoods of stakeholders and customers at serious risk, and those organizations that …
13 Anonymous hackers plead guilty to PayPal DDoS attack
Thirteen defendants pleaded guilty in federal court in San Jose on Friday to charges related to their involvement in the cyber-attack of PayPal’s website as part of the …
Cloud security in 2014: Automation and consolidation
Eric Chiu, president and co-founder of HyTrust, predicts that in 2014: 1. Organizations will discover the importance of BYOS for public cloud. Given the recent disclosures …
ENISA issues recommendations on SCADA patching
“How long can we afford having critical infrastructures that use unpatched SCADA systems?” the EU’s cyber security Agency ENISA asks, and advises EU Member …
Week in review: Air gap-hopping malware, first PoS botnet, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: (IN)SECURE Magazine issue 40 released (IN)SECURE Magazine is a free digital security …
Data-slurping Android flashlight app developer settles with FTC
The creator of one of the most popular apps for Android mobile devices has agreed to settle Federal Trade Commission charges that the free app, which allows a device to be …
What CIOs can expect in 2014
While the 3rd platform of mobile, social, big data, and cloud services is just beginning to mature, it will require an entirely different set of IT skills and roles — many of …
CSA details Software Defined Perimeter Framework
The Cloud Security Alliance (CSA) announced the release of the Software Defined Perimeter Report, a new white paper report that explains the Software Defined Perimeter (SDP) …