Help Net Security
Why the iPhone fingerprint reader is a good idea
Two new iPhones have been announced. According to Apple’s presentation, the most common way to secure a device is with a passcode and about half of smartphone users do …
(IN)SECURE Magazine issue 39 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 39 has been released today. Table of contents: …
Multiplayer games and DoS attacks
Prolexic, detailed the rampant problem of denial of service attacks within and from online gaming communities. The DDoS attacks, which can pack a powerful punch by the use of …
Free endpoint security inspection tool
Promisec announced a free, downloadable and automated security inspection for up to 100 endpoints. The free inspection process (available here) produces results in about five …
Big data spending to reach $114 billion in 2018
Global spending on big data by organizations will exceed $31 billion in 2013, finds a new market forecast by ABI Research. The spending will grow at a CAGR of 29.6% over the …
Secure mobile managed file transfer with MOVEit
Ipswitch File Transfer released MOVEit 8.0 – a software package that enables mobile workers to transfer files as part of key business processes, while providing IT the …
Microsoft releases 13 bulletins, axes .NET patch
September’s Patch Tuesday is live! The 14 bulletins predicted have been cut to 13, with the .NET patch landing on the cutting room floor. A patch getting pulled after …
Is BEAST still a threat?
Yesterday I changed the SSL Labs rating criteria to stop penalizing sites that do not implement server-side mitigations for the BEAST attack. That means that we now consider …
New gTLD security implications
The new gTLDs that are being implemented have a few security concerns already. One of the major concerns is Name Collision, which results from a single domain name being used …
Security heavyweights to keynote HITB conference in Malaysia
This October, both Chief Security Officers of Akamai and Facebook will be in Kuala Lumpur to deliver their Day 1 and Day 2 keynote talks at HITBSecConf 2014 (October 16th and …
Timing is an influential risk-factor for cyber attacks
There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults. According …
HyTrust Appliance gets role-based monitoring
HyTrust released HyTrust Appliance 3.5, which enables enterprises to virtualize mission-critical applications and deploy multi-tenant private clouds. This solution for policy …
Featured news
Resources
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects