Help Net Security
Most top 500 Android mobile apps have security and privacy risks
After testing the top 500 Android applications, MetaIntell identified that approximately 460 of those 500 Android applications (available in apps stores such as Amazon, CNET, …
Top 10 DDoS attack trends
Prolexic Technologies, a provider of DDoS protection services, published its top 10 attack trends for 2013. Throughout the year, metrics were collected from all DDoS attacks …
ENISA: Industrial Control Systems require coordinated capability testing
EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated testing of capability of the often outdated …
Most SMB employees in fear of identity theft in the workplace
The smaller business workplace has transformed into a mobile-enabled, agile, and satisfying environment, but one where the workforce is acutely aware and worried about the …
Motivation and techniques of world’s most sophisticated cyber attackers
CrowdStrike released “CrowdStrike Global Threats Report: 2013 Year in Review,” the product of its year-long study of more than 50 groups of cyber threat actors. …
Millions stolen via bluetooth-enabled skimming devices
Thirteen individuals have been indicted by the Manhattan District Attorney for stealing victims’ banking information with skimming devices at gas stations throughout the …
Free trial for cloud-based encryption and secure key management on AWS
SafeNet announced a thirty-day free trial of its ProtectV virtual encryption solutions and Virtual KeySecure via AWS Marketplace on Amazon Web Services (AWS). Financial …
Most non-IT employees don’t “get” company IT security policies
DataMotion released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT …
Cisco introduces Cybersecurity Specialist certification
To meet the increasing challenges of securing enterprise networks evolving in size, scope and complexity, Cisco announced a major revision of the CCNP Security Certification, …
Companies must improve incident response plans
Security threats are imminent, but CEOs and other members of the management team are in the dark about potential cyber-attacks against their companies, say the results of a …
Financial sector needs non-replicable, single-use credentials
Different tokens, devices, mobile phones, e-signatures, etc. are used to authenticate our e-identities. Yet, some financial institutions are still not considering the risk of …
Cybersecurity predictions for 2014
The advent of new technologies, the widespread implementation of mobile and wireless communication and the increase in mobile adoption will open up new opportunities for …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring