Help Net Security
Connecting cloud storage services and cloud-based data loss prevention
CoSoSys released a new version of My Endpoint Protector, a cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution for both Macs and PCs. The new …
Spammers are always thinking up new tricks
The percentage of spam in email traffic in May averaged 69.8 per cent – 1.3 percentage points less than the previous month. May saw numerous mass mailings for schools …
Microsoft supports open source software framework for IoT
The AllSeen Alliance, the broadest Internet of Everything open-source project, announced that Microsoft has joined the group’s multi-company effort as a Premier Member …
Live open source security lab coming to Cyber Security EXPO
Cyber Security EXPO, part of IP EXPO Europe, is calling for contributors to the Cyber Hack, a live open source security lab arriving at the show this October. The Hack area …
Exploit switches off Microsoft EMET’s protection features
By leveraging and modifying a “semi-random public exploit” researchers have managed to deactivate all protection features of the latest version of …
Physical location of data will become increasingly irrelevant
The physical location of data still matters, but will become increasingly irrelevant and will be replaced by a combination of legal location, political location and logical …
Facebook SDK flaw allows unauthorized access to Facebook accounts
MetaIntell has uncovered a significant security vulnerability in the Facebook SDK (V3.15.0) for both iOS and Android. Dubbed Social Login Session Hijacking, when exploited …
IEEE launches Anti-Malware Support Service
IEEE announced the launch of IEEE Anti-Malware Support Service (AMSS). A new service from IEEE Standards Association’s (IEEE-SA) Industry Connections Security Group …
Number and diversity of phishing targets continues to increase
The number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter, the Anti-Phishing Working Group reports. 2013 was one of the heaviest …
How to build trust between business and IT
One of the biggest challenges we face with securing our networks and systems is that many businesses view cyber security as an IT problem and not a business problem. However, …
DDoS attacks are becoming more effective
Disruptive cyber-attacks are becoming more effective at breaching security defenses, causing major disruption and sometimes bringing down organizations for whole working days, …
5 essential mobile security tips
It doesn’t matter if you’re using iOS, Android, Windows Phone or BlackBerry, these tips apply to every mobile device that connects to the Internet. “How …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring