Help Net Security
The globalization of business is increasing exposure to fraud
The number of companies falling victim to fraud has increased in the past year, according to the 2013 Kroll Global Fraud Report. Overall, 70 percent of companies were affected …
Data visualization of global DDoS attacks
Arbor Networks have collaborated with Google Ideas to create a data visualization that maps global DDoS attacks. Google Ideas – a “think/do’ tank – …
Higher education networks 300% more likely to contain malware
OpenDNS researchers found that higher education networks are 300 percent more likely to contain malware than their enterprise and government counterparts. The study also …
Building an information security awareness program from scratch
Most security awareness programs suck. They involve canned video presentations or someone from HR explaining computer use policies. Others are extremely expensive and beyond …
Internet of Things starter kit from IBM and Libelium
IBM and Libelium released an Internet of Things Starter Kit to enable dozens of sensor applications ranging from monitoring parking spaces or air pollution to providing …
Webinar: The threat of unfettered searching
While many have come to appreciate the power of modern search engines, such as Google or Bing, there is a threat presented by unfettered searching – one that can …
Mobile IDS/IPS solution for iOS devices
Skycure introduced its mobile IDS/IPS solution that protects iPhones and iPads by monitoring network traffic behavior and remediating suspicious activity. Existing solutions …
The IT road to hell
The past several months have been an unending nightmare for the US government and its allies, as one disclosure after another has caused unimaginable damage to relationships, …
Video: Operationalizing security intelligence in the enterprise
Many organizations say they acquire and use security intelligence for the benefit of their organizations – but few actually do this right. While security intelligence is …
Week in review: Vessel tracking system cracked, iCloud protocols analyzed, the relevancy of AV tests
Here’s an overview of some of last week’s most interesting news, videos, inteviews and articles: Digital ship pirates: Researchers crack vessel tracking system In …
Big thinkers converge on small town for Day-Con 2013
Day-Con, Dayton Ohio’s annual hacker conference, celebrated its 7th year last month with a completely re-imagined format: limited seating, invitation only, and …
Ubuntu 13.10 released, improves on cloud setup and management
Canonical released the next version of Ubuntu for server and cloud environments. Ubuntu 13.10 delivers the latest and best version of OpenStack, and is the fastest, most …
Featured news
Sponsored
Don't miss
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark
- How network segmentation can strengthen visibility in OT networks