Help Net Security
Fake Amazon “Order Status” emails deliver malware
It comes as no surprise that as holiday shoppers begin to flood the internet looking for deals, the bad guys will be right behind them hoping to swoop in on an unsuspecting …
9 out of 10 consumers would rather companies didn’t store their info
In the wake of data scandals, consumer trust in data security has hit a ten year low, with over 1 in 10 suffering from a data loss, Fujitsu’s data research report has …
Passwords aren’t going away any time soon
Despite nearly weekly revelations of new password database breaches, a survey by Authentify suggests that passwords will remain the primary protection for online accounts. Of …
Experts offer cyber security forecast for the year ahead
Kroll released its third annual Cyber Security Forecast, a prediction of the most significant cyber issues organizations will confront in 2014. The latest forecast highlights …
(IN)SECURE Magazine issue 40 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 40 has been released today. Table of contents: How …
Security gate for open doors
Internet crime has evolved to a full blown cyber-war, using internet servers as virtual soldiers to take down critical network infrastructures, or to steal information. While …
Top six security threats for 2014
The Information Security Forum (ISF) has announced their forecast of the top six security threats global businesses will face in 2014. Key threats include BYOD trends in the …
Shopping convenience overrides security concerns
Tripwire announced the results of a survey on mobile security and holiday shopping. The survey was conducted by Dimensional Research and OnePoll from November 18-20, 2013, and …
Akamai to acquire Prolexic
Akamai and Prolexic have signed a definitive agreement for Akamai to acquire Prolexic, a provider of cloud-based security solutions for protecting data centers and enterprise …
OS X hardening tips
OS X security is evolving: defenses are improving with each OS release but the days of “Macs don’t get malware” are gone. Recent attacks against the Java Web …
Eyes on the cloud: Six predictions for 2014
As we head into 2014, people in the cloud virtualization industry begin to wonder exactly what to expect from the technology in the New Year. We’ve seen some interesting …
Week in review: Cyber Monday dangers, Twitter adds Forward Secrecy, and a Linux worm that targets the Internet of Things
Week in review: Here’s an overview of some of last week’s most interesting news, videos and articles: Innovations that will shape network security Responding to an …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)