Help Net Security
The complexity of Android malware is increasing
259 new mobile threat families and variants of existing families were discovered by F-Secure Labs in the third quarter of 2013, according to the a new mobile threat report for …
Malware analysts regularly investigate undisclosed data breaches
ThreatTrack Security published a study that reveals mounting cybersecurity challenges within U.S. enterprises. Nearly 6 in 10 malware analysts reported they have investigated …
7 must-have technical security controls for any budget
Prioritizing items on a security budget can be difficult. Here’s seven key technical controls every IT shop should include in a security budget. 1. Perimeters defenses …
Week in review: TrueCrypt’s public security audit, new MS 0-day exploited, new bug bounty programs
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: ENISA issues recommendations for securing data using cryptography …
Inkblots could solve problem of compromised passwords
Carnegie Mellon University computer scientists have developed a new password system that incorporates inkblots to provide an extra measure of protection when, as so often …
IETF to improve the security of Internet protocols
Internet security has been a focus this week for the more than 1100 engineers and technologists from around the world gathered at the 88th meeting of the Internet Engineering …
Upcoming Patch Tuesday to bring both relief and frustration
The November Patch Tuesday Advance Bulletin is out and I think everyone is breathing a sigh of both relief and frustration. Relief because for the first time in a few months, …
European NSA is not a solution
The European Parliament should use its powers to reconsider EU-US data transfer deals and push for the creation of a European privacy cloud, EU-level protection for …
Fear of attacks leads to highly emotional decision making
Recent publicity about cyberattacks and data security breaches has increased IT risk awareness among CIOs, CISOs and senior business executives. However, Gartner’s 2013 …
Mikko Hypponen: How the NSA betrayed the world’s trust
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American …
HyTrust acquires HighCloud Security
HyTrust has acquired HighCloud Security, a provider of cloud encryption and key management software. By combining HyTrust’s administrative visibility and control with …
GFI MAX Mobile Device Management launched
GFI MAX announced GFI MAX Mobile Device Management (MDM), a new offering for managed services providers looking to create new revenue opportunities as increasing numbers of …
Featured news
Sponsored
Don't miss
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark
- How network segmentation can strengthen visibility in OT networks