Help Net Security
TRUSTe launches new privacy assessments
TRUSTe expanded its Data Privacy Management Platform to include TRUSTed Assessments, a new privacy assessment solution which addresses the need for specialized tools to …
Week in review: Vulnerable web-based password managers, Mayhem malware, and Google’s Project Zero
Here’s an overview of some of last week’s most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman …
40% of IT security teams keep executives in the dark
A new survey uncovered the communication challenges between IT security professionals and executives, a desire to overhaul current security systems and limited security …
Are endpoints the most vulnerable part of the network?
Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …
Acunetix offers free network security scan
Acunetix is offering 10,000 free network security scans with Acunetix Online Vulnerability Scanner in a bid to make it easier for businesses to take control of their network …
Seagate delivers five new NAS products
Seagate announced five NAS products in a range of capacities from 2TB to 30TB and performance suited for the home office to small businesses with up to 50 employees. The …
How hackers get in: Lessons from a network security audit
Data security is a defining challenge for our time, yet many businesses and other organizations remain under-prepared. The problem stems from numerous sources: lack of concern …
Exposing the insecurity of hotel safes
Travel documents, cash, mobile devices, cameras, jewellery and company documents – on holiday or on a business trip, tourists and business people alike often carry …
63% of businesses don’t encrypt credit cards
In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known …
Pushdo Trojan infects 11,000 systems in 24 hours
Bitdefender has discovered that a new variant of the Trojan component, Pushdo, has emerged. 77 machines have been infected in the UK via the botnet in the past 24 hours, with …
New IP-based wireless networking protocol created
Recognizing the need for a better way to connect products in the home, seven companies announced that they’ve joined forces to develop Thread, a new IP-based wireless …
49% of security pros think Java apps are vulnerable to attacks
In a recent poll, half of the senior IT professionals polled said their Java applications are vulnerable (32%) or very vulnerable (17%) to attacks. They cited insecure coding …
Featured news
Resources
Don't miss
- Radio signals could give attackers a foothold inside air-gapped devices
- Product showcase: RoboForm password manager for iOS
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken