Help Net Security
Risks and opportunities of personal data, privacy, and trust
The increased number of stories on data breaches in the news today has many implications, for consumers it’s an increased risk of financial loss, identity theft and …
Product pitch: DigiCert Certificate Inspector
SSL Certificates serve as the security backbone of the internet, securing billions of interactions annually. Yet, too often, system administrators fail to properly configure …
Operation dismantles child exploitation enterprise on Tor network
DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …
Full Disclosure mailing list closure elicits mixed reactions
The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its …
Edward Snowden: Here’s how we take back the Internet
Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but …
The Internet of Things will transform the data center
The Internet of Things (IoT) has a potential transformational effect on the data center market, its customers, technology providers, technologies, and sales and marketing …
20% of all malware ever created appeared in 2013
According to the latest PandaLabs report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever …
91% of video surveillance deployments involve IT departments
ESG research found that among organizations currently using video surveillance technology, 91% indicate that IT manages or supports these deployments. Of the final survey pool …
25,000 UNIX servers hijacked by backdoor Trojan
The ESET security research team, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing and other leading agencies, has uncovered a widespread …
Trustwave acquires Cenzic
Trustwave announced the acquisition of Cenzic, financial terms were not disclosed. The combination will create an integrated security testing platform designed to help …
(IN)SECURE Magazine special issue released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Featured in this magazine are the most important news …
Net neutrality: Industry MEPs want stricter rules against blocking rival services
Internet providers should no longer be able to block or slow down internet services provided by their competitors, says the Industry Committee which on Tuesday approved rules …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online