Help Net Security
Webcast: Beware of the Wild Wild Web
The World Wide Web is wasteland brimming with uncontrolled threats and dangers to IT security. Network and IT managers can prevent those threats from causing damage by …
Risks and opportunities of personal data, privacy, and trust
The increased number of stories on data breaches in the news today has many implications, for consumers it’s an increased risk of financial loss, identity theft and …
Product pitch: DigiCert Certificate Inspector
SSL Certificates serve as the security backbone of the internet, securing billions of interactions annually. Yet, too often, system administrators fail to properly configure …
Operation dismantles child exploitation enterprise on Tor network
DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …
Full Disclosure mailing list closure elicits mixed reactions
The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its …
Edward Snowden: Here’s how we take back the Internet
Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but …
The Internet of Things will transform the data center
The Internet of Things (IoT) has a potential transformational effect on the data center market, its customers, technology providers, technologies, and sales and marketing …
20% of all malware ever created appeared in 2013
According to the latest PandaLabs report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever …
91% of video surveillance deployments involve IT departments
ESG research found that among organizations currently using video surveillance technology, 91% indicate that IT manages or supports these deployments. Of the final survey pool …
25,000 UNIX servers hijacked by backdoor Trojan
The ESET security research team, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing and other leading agencies, has uncovered a widespread …
Trustwave acquires Cenzic
Trustwave announced the acquisition of Cenzic, financial terms were not disclosed. The combination will create an integrated security testing platform designed to help …
(IN)SECURE Magazine special issue released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Featured in this magazine are the most important news …