Help Net Security
Which e-commerce sites do more to protect your password?
Consumers increasingly share their personal data, including payment information, with a growing number of e-retailers. The keys that protect their personal data are the …
Week in review: Chrome bugs turns browser into listening device, Target POS malware author reveals himself
Here’s an overview of some of last week’s most interesting news and articles: Ad-pushers buy Chrome add-ons, update them to inject ads Google has a new problem: …
Developing countries are more willing to trade privacy for security
Microsoft has released the results of a global survey that tried to answer the question how people around the world see technology and how personal technology has changed …
Financial data leads the malicious spam hit list
The proportion of spam in email traffic continues to fall – in the last three years the share of unsolicited messages has fallen by 10.7 percentage points. It appears …
EU Commission joins forces with companies for 250,000 training courses and new digital jobs
European Commission President José Manuel Barroso and Vice President Neelie Kroes brought CEOs from across the global economy together at the World Economic Forum in Davos …
Looking back at 10 years of mobile malware
From Cabir to FakeDefend, the last decade has seen the number of mobile malware explode. In 2013, Fortinet’s FortiGuard Labs has seen more than 1,300 new malicious …
Fixing the Internet of Things
Calling all devices: We are Internet, Resistance is futile! I’ve been at this long enough to see the birth of the Internet, the current state of the Internet and the …
Penetration testing: Accurate or abused?
According to a recent Ponemon study, since 2010 cybercrime costs have climbed 78% and the time required to recover from a breach has increased 130%. On average, U.S. …
Best practices to help prevent online data breaches
The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the …
Most top 500 Android mobile apps have security and privacy risks
After testing the top 500 Android applications, MetaIntell identified that approximately 460 of those 500 Android applications (available in apps stores such as Amazon, CNET, …
Top 10 DDoS attack trends
Prolexic Technologies, a provider of DDoS protection services, published its top 10 attack trends for 2013. Throughout the year, metrics were collected from all DDoS attacks …
ENISA: Industrial Control Systems require coordinated capability testing
EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated testing of capability of the often outdated …
Featured news
Resources
Don't miss
- Prioritizing data and identity security in 2025
- eBook: What does it take to be a full-fledged virtual CISO?
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk