Help Net Security
What healthcare security and privacy pros wish for
2013 proved to be a dizzying year for healthcare compliance, privacy, and information security: the Affordable Care Act, enforcement of the HIPAA Omnibus Final Rule, and …
The security realities of the Internet of Things
SANS announced results of its 2013 Securing the Internet of Things survey, in which 391 IT professionals answered questions about the current and future security realities of …
Biometric open protocol standard for safer authentication established
While biometrics are becoming a ubiquitous component of securing consumer data on mobile and other digital devices, there is no industry standard in place to protect that data …
ENISA issues report on how to act after power cuts
EU cyber security Agency ENISA has issued a new report studying network outages caused by power cuts in detail, resulting in key findings and recommendations to the electronic …
Senior managers are the worst information security offenders
As companies look for solutions to protect the integrity of their networks, data centers, and computer systems, an unexpected threat is lurking under the surface—senior …
What drives salary hikes for IT professionals?
The biggest salary increases for IT professionals are for roles that demand specific experience in big data analytics; ecommerce and mobile; and IT security. Salaries for all …
Top priorities for organisations to counter digital criminality
Martin Sutherland, Managing Director, BAE Systems Detica highlights that the single biggest issue that will hit organisations in 2014 will be the rise of digital criminality …
What are the most effective means for achieving IT ops excellence?
Based on results collected across a variety of industry verticals – including financial services, healthcare, manufacturing, and retail – Continuity …
Triggering deep vulnerabilities using symbolic execution
Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths …
Palo Alto Networks acquires Morta Security
Palo Alto Networks has acquired Morta Security, a Silicon Valley-based cybersecurity company operating in stealth mode since 2012. Financial terms of the acquisition were not …
Stealing money from ATMs with malware
This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The …
The futility of all vendor predictions
As the New Year starts, many people look forward to what it will bring, and for many this involves looking at upcoming budgets and deciding on what to spend the money …
Featured news
Resources
Don't miss
- Cisco fixes AsyncOS vulnerability exploited in zero-day attacks (CVE-2025-20393)
- Product showcase: Penetration test reporting with PentestPad
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses