Help Net Security
Week in review: GCHQ intercepts Google, Facebook users’ communications, Code Spaces destroyed by extortion hack attack
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here …
Are your third-party vendors leaving the door open to hackers?
By now, every security professional in the world should know the story about Fazio Mechanical Services. The Pennsylvania-based company specializes in heating, air conditioning …
Demand for PaaS on the rise
A new age of Develop Your Own Application (DYOA) to meet ever-changing business requirements is driving demand for rapid application development Platform-as-a-Service (PaaS) …
The future of cloud computing
North Bridge Venture Partners, in conjunction with Gigaom Research and 72 collaborating organizations, today released results for its Future of Cloud Computing survey. This …
Authorization model for home automation
Smartphones promise to play an important role in the management and control of Home Automation (HA) solutions. When things and devices have either no or a constrained user …
Most European businesses face a tech deficit
A tech deficit currently affects 72% of European businesses and leads to a gap between what businesses need to achieve and what their infrastructure can support. When compared …
Sir Tim Berners-Lee to open IP EXPO Europe
In his first address to the core IT community of IP EXPO Europe, Sir Tim will outline his 2050 vision for the web and how businesses will use it for competitive advantage. …
Password protected Zbot malware in the wild
Early this morning a small malware campaign started up claiming to be daily customer statements from Berkeley Futures Limited (real company, but messages are spoofed). The …
Five steps towards cyber breach preparation
Earlier this week, Domino’s Pizza became the latest victim of a breach and ransom demand. Recent DDoS attacks on Evernote and Feedly DDoS, along with the efforts of …
Endpoint protection attitudes and opinions
Bromium surveyed more than 300 information security practitioners focused on endpoint threats and security. The overwhelming majority of information security professionals …
Remove Android ransomware for free
avast! Ransomware Removal is a free app that eliminates Android ransomware and decrypts locked and ransomed files. Simplocker is a new Android virus that encrypts photos, …
Privacy, security most likely to drive consumer action
According to a new study by Edelman, among major technology policy issues, security and privacy of personal data was overwhelmingly the largest concern for consumers, ranking …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground