Help Net Security
Accreditation program strengthens global supply chain security
The Open Group launched the Open Trusted Technology Provider Standard (O-TTPS) Accreditation Program, aimed at assuring the integrity of commercial off-the-shelf (COTS) …
Top enterprise security threats identified
A new report from HP provides in-depth data and analysis around the most pressing security issues plaguing enterprises. It details factors that contributed most to the growing …
Security breaches, data loss and outages cost U.S. hospitals $1.6B
A new MeriTalk report, based on a survey of healthcare IT executives and underwritten by EMC, quantifies the organizational cost associated with security breaches, data loss, …
Dell releases secure, managed, ultra-mobile cloud access device
Dell announced Dell Wyse Cloud Connect, an ultra-compact and highly mobile cloud-access device that delivers desktop virtualization and personal cloud services to any HDMI- or …
Defending against drive-by downloads
In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …
Week in review: Feds clone TorMail server, first Android bootkit, SpyEye creator pleads guilty
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Which e-commerce sites do more to protect your password? A …
Reactions to the Yahoo Mail hack
Unknown attackers have attempted to access a number of Yahoo Mail accounts and urged users to change their passwords even if they haven’t been affected. Here are some of …
Global view of attack traffic and security
Akamai released its latest report, which provides insight into key global statistics on attack traffic and security. Akamai maintains a distributed set of unadvertised agents …
Why governance and policy can strengthen compliance efforts
A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …
10,000+ UK systems affected by ICEPOL Trojan ransomware
At least 10,331 successful installs of ICEPOL Trojan ransomware took place in the UK last year. Bitdefender’s Cybercrime Investigation Unit analysed the disk images of …
Check Point discovers critical vulnerability in MediaWiki
Check Point found a critical vulnerability in the MediaWiki project Web platform, a popular open source Web platform used to create and maintain ‘wiki’ Web sites. …
Risky online behaviour is putting teens in danger
Research by McAfee and the Anti-Bullying Alliance has found that 14-15 year old teenagers are most likely to adopt risk-taking behaviours and overshare online; putting …