Help Net Security
DDoS attacks used to influence stock prices
Prolexic Technologies shared an analysis of nearly a dozen global DDoS attacks that indicates cyber attackers are using DDoS attacks in an attempt to influence market values …
Most adults share intimate info via unsecured digital devices
McAfee examined how more than 1,500 consumers are sharing and storing intimate data on their mobile devices, especially with current or former significant others. Sharing …
Malware laden emails at five year high
This past month of January we saw a pretty incredible spike in virus traffic. Other unsolicited emails ebbed and flowed throughout the month resulting in a regular average …
USA still the global spam king
SophosLabs revealed the Dirty Dozen top spam-relaying nations, as it published the final “Spampionship” league table of 2013. Once again, it was the USA which …
By 2016, 30% of organizations will use biometric authentication on mobile devices
The consumerization of IT and business BYOD programs have resulted in potential security problems for IT leaders, according to Gartner. User expectations of a clean and simple …
Accreditation program strengthens global supply chain security
The Open Group launched the Open Trusted Technology Provider Standard (O-TTPS) Accreditation Program, aimed at assuring the integrity of commercial off-the-shelf (COTS) …
Top enterprise security threats identified
A new report from HP provides in-depth data and analysis around the most pressing security issues plaguing enterprises. It details factors that contributed most to the growing …
Security breaches, data loss and outages cost U.S. hospitals $1.6B
A new MeriTalk report, based on a survey of healthcare IT executives and underwritten by EMC, quantifies the organizational cost associated with security breaches, data loss, …
Dell releases secure, managed, ultra-mobile cloud access device
Dell announced Dell Wyse Cloud Connect, an ultra-compact and highly mobile cloud-access device that delivers desktop virtualization and personal cloud services to any HDMI- or …
Defending against drive-by downloads
In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …
Week in review: Feds clone TorMail server, first Android bootkit, SpyEye creator pleads guilty
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Which e-commerce sites do more to protect your password? A …
Reactions to the Yahoo Mail hack
Unknown attackers have attempted to access a number of Yahoo Mail accounts and urged users to change their passwords even if they haven’t been affected. Here are some of …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)