Help Net Security
The biggest challenge to IT security is marketing
Most companies today are using social media and online marketing channels to tell their customers and prospects about what they do. From company Twitter accounts, LinkedIn …
An introduction to firmware analysis
This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an …
Week in review: Target breach expands, the security realities of the Internet of Things
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: How to make malware warnings more effective? An effective security …
Personal info of 70 million Target customers compromised
Target today announced updates on its continuing investigation into the recent data breach. As part of Target’s ongoing forensic investigation, it has been determined …
Fear of data sharing on the rise
U.S. consumer attitudes and behavior related both to data sharing and social media oversharing have shifted significantly just within the last two years, according to a new …
The basics of digital wireless communication
The aim of this talk by Clemens Hopfer from the 30th Chaos Communication Congress is to give an understandable insight into wireless communication, using existing systems as …
Barracuda Networks unveils Backup-as-a-Service
Barracuda Networks announced its new Backup-as-a-Service (BaaS) offering, which allows Barracuda Backup 190 and 390 to be purchased as an annual service that includes an …
Light Patch Tuesday coming up
2014 is getting off to a light start with Microsoft. Only four advisories in the January advance notification. For the first time in a while, there is not a cumulative IE roll …
Key trends for identity and access management
CA Technologies announced its predictions in identity and access management (IAM) and their impact on security professionals in 2014. “We believe that the technology …
What healthcare security and privacy pros wish for
2013 proved to be a dizzying year for healthcare compliance, privacy, and information security: the Affordable Care Act, enforcement of the HIPAA Omnibus Final Rule, and …
The security realities of the Internet of Things
SANS announced results of its 2013 Securing the Internet of Things survey, in which 391 IT professionals answered questions about the current and future security realities of …
Biometric open protocol standard for safer authentication established
While biometrics are becoming a ubiquitous component of securing consumer data on mobile and other digital devices, there is no industry standard in place to protect that data …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation