Help Net Security
Analysis of 3000 vulnerabilities in SAP
According to official information from SAP portal, more than 3000 vulnerabilities have been closed by SAP. Here are 6 highlights from a research conducted by the ERPScan team …
Week in review: Replicating NSA’s gadgets using open source, World Cup-themed threats, and life after TrueCrypt
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Replicating NSA’s gadgets using open source In this …
One-third of cyber attacks take hours to detect
More than one-third of cyber attacks take hours to detect. Even more alarming, resolving breaches takes days, weeks, and in some cases, even months. Despite increased resource …
The privacy attitudes of 15,000 consumers from 15 countries
Spanning 15 countries and 15,000 consumers, the the EMC Privacy Index reveals consumers hold viewpoints on privacy that vary widely by geography and the type of activity …
What’s the leading cause of data loss?
HDD crashes more than doubled in the last four years, prevailing as the most common cause of data loss according to customer data provided by Kroll Ontrack. When asked about …
Linksys launches Pro Series Wireless Access Point
Linksys announced the first Pro Series Wi-Fi access point with the launch of the Wireless-AC Dual Band Access Point (LAPAC1750PRO). The new Pro Series access point offers …
Advanced cyber attacks rely on privileged credential exploitation
While new and sophisticated malware variants were continually developed to exploit systems in 2013, criminals, hacktivists and advanced attacks continue to do the most damage …
Life after TrueCrypt
While speculation continues around the fate of popular disk encryption software TrueCrypt, Sophos conducted a survey of over 100 IT professionals regarding their use of …
Top 10 most trustworthy online retailers
The Online Trust Alliance (OTA) announced today the results of its 2014 Online Trust Audit. Out of nearly 800 top consumer websites evaluated, 30.2 percent made the Honor …
GFI Cloud gets remote control and screen sharing
GFI Software announced the addition of remote control and remote access capabilities as part of a major update to GFI Cloud, the company’s IT platform for SMBs. GFI …
Google End-to-End: The encryption silver bullet?
The world seems to be turning its attention to the notion of data encryption, and Google is the latest to jump on the bandwagon. On June 3rd, Google announced that it would be …
Is your data already out there?
CIOs cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors, …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits