Help Net Security
Operation dismantles child exploitation enterprise on Tor network
DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …
Full Disclosure mailing list closure elicits mixed reactions
The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its …
Edward Snowden: Here’s how we take back the Internet
Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but …
The Internet of Things will transform the data center
The Internet of Things (IoT) has a potential transformational effect on the data center market, its customers, technology providers, technologies, and sales and marketing …
20% of all malware ever created appeared in 2013
According to the latest PandaLabs report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever …
91% of video surveillance deployments involve IT departments
ESG research found that among organizations currently using video surveillance technology, 91% indicate that IT manages or supports these deployments. Of the final survey pool …
25,000 UNIX servers hijacked by backdoor Trojan
The ESET security research team, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing and other leading agencies, has uncovered a widespread …
Trustwave acquires Cenzic
Trustwave announced the acquisition of Cenzic, financial terms were not disclosed. The combination will create an integrated security testing platform designed to help …
(IN)SECURE Magazine special issue released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Featured in this magazine are the most important news …
Net neutrality: Industry MEPs want stricter rules against blocking rival services
Internet providers should no longer be able to block or slow down internet services provided by their competitors, says the Industry Committee which on Tuesday approved rules …
UK tax season threatened by phishing and malware attacks
Bitdefender has warned taxpayers to be cautious after discovering that a total of 10,000 tax-related spam emails were sent in a single day in the first week of March. The tax …
Eight cyber security tips I learned from The Walking Dead
Sometimes two things that don’t seem to go together, make the most magical combinations. This article is the first in a new series of security articles I’ll be …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade