Help Net Security
Top 10 DDoS attack trends
Prolexic Technologies, a provider of DDoS protection services, published its top 10 attack trends for 2013. Throughout the year, metrics were collected from all DDoS attacks …
ENISA: Industrial Control Systems require coordinated capability testing
EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated testing of capability of the often outdated …
Most SMB employees in fear of identity theft in the workplace
The smaller business workplace has transformed into a mobile-enabled, agile, and satisfying environment, but one where the workforce is acutely aware and worried about the …
Motivation and techniques of world’s most sophisticated cyber attackers
CrowdStrike released “CrowdStrike Global Threats Report: 2013 Year in Review,” the product of its year-long study of more than 50 groups of cyber threat actors. …
Millions stolen via bluetooth-enabled skimming devices
Thirteen individuals have been indicted by the Manhattan District Attorney for stealing victims’ banking information with skimming devices at gas stations throughout the …
Free trial for cloud-based encryption and secure key management on AWS
SafeNet announced a thirty-day free trial of its ProtectV virtual encryption solutions and Virtual KeySecure via AWS Marketplace on Amazon Web Services (AWS). Financial …
Most non-IT employees don’t “get” company IT security policies
DataMotion released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT …
Cisco introduces Cybersecurity Specialist certification
To meet the increasing challenges of securing enterprise networks evolving in size, scope and complexity, Cisco announced a major revision of the CCNP Security Certification, …
Companies must improve incident response plans
Security threats are imminent, but CEOs and other members of the management team are in the dark about potential cyber-attacks against their companies, say the results of a …
Financial sector needs non-replicable, single-use credentials
Different tokens, devices, mobile phones, e-signatures, etc. are used to authenticate our e-identities. Yet, some financial institutions are still not considering the risk of …
Cybersecurity predictions for 2014
The advent of new technologies, the widespread implementation of mobile and wireless communication and the increase in mobile adoption will open up new opportunities for …
“123456” unseats “password” from top of worst passwords list
SplashData has announced its annual list of the 25 most common passwords found on the Internet, and for the first time since the company began compiling its annual list, …
Featured news
Resources
Don't miss
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security