Help Net Security
Major vulnerabilities in office security and RFID systems
At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and …
ISACA updates IS Audit and Assurance Standards
ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards have an effective date of 1 November 2013. Introduced in 1988, the IS Audit and …
File infector EXPIRO hits US, steals FTP credentials
An unusual attack has been spotted in the wild, using an unexpected combination of threats. This attack used exploit kits (in particular Java and PDF exploits) to deliver file …
Bank security breaches destroy customer trust
85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, …
Switch secures confidential data on separate networks
Belkin expanded its secure product line with the addition of the Belkin DisplayPort KVM Switch. The new switch offers the ideal solution for federal and defense users who …
Tripwire updates Log Center solution
Tripwire announced the availability of its Log Center TLC 7.0 featuring the first phase of integration with IP360, as well as Tripwire’s new VIA Agent, log intelligence, …
Metrics: Valuable security indicator or noise?
Many organizations believe that IT, and by association IT security, is a wasted expense. They recognize that the financial investment needs to be made but few truly understand …
DDoS attacks are getting bigger, stronger and longer
Prolexic Technologies announced that the average packet-per-second (pps) rate reached 47.4 Mpps and the average bandwidth reached 49.24 Gbps based on data collected in Q2 2013 …
Social engineering tops list of help desk security threats
Help desks are most commonly asked to assist users in addressing common IT problems including password resets and application and connectivity issues. Often the performance of …
Vendors patch security vulnerabilities within 3 weeks
High-Tech Bridge Security Research Lab released its statistics on web application security for the first half of 2013. The statistics is based on HTB Security Advisories that …
Many join EFF to sue NSA over illegal surveillance
Nineteen organizations including gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the NSA for violating …
US retains spamming crown
Sophos has published the latest ‘Dirty Dozen’ of spam relaying countries, covering the second quarter of 2013. As the US retains the top spot among spam-relaying …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days