Help Net Security
Lessons learned from Anonymous and Operation Last Resort
Activists that have links to Anonymous were able to gain access to U.S. government computers through a software flaw on the outdated Adobe ColdFusion platform. This left many …
Browser scan unveils an abundance of critical vulnerabilities
Through our Qualys BrowserCheck online tool we have collected data from over 1.4 million user computer scans and their respective browsers. From this research, we have found …
Can we expect a cyberwar resurgence?
Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the …
Verify your software for security bugs
Verification is an important phase of developing secure software that is not always addressed in depth that includes dynamic analysis and fuzzing testing. This step allows …
The true cost of cybercrime
From a cybercrime perspective, the opportunities are boundless: Seemingly everything has a computer in it, cars and pacemakers included. It’s almost certain that the …
Secure cloud storage service MEGA releases iOS app
MEGA is a secure cloud storage service with 50 GB free storage space. The official MEGA iOS app is now available on the App Store. Features: Browse and manage your MEGA cloud …
Malware creation hits record-high numbers
PandaLabs has published the results of its Quarterly Report for Q3 2013. One of the main conclusions that can be drawn from this global study is that malware creation has hit …
How IT will transform business in 2014
Generally speaking, I’m not a big fan of predictions. I’ve never met anyone with a crystal ball that doesn’t work near a boardwalk or a table ensconced in …
Beware of online dangers lurking this Cyber Monday
Cyber Monday is often regarded as the beginning of the holiday shopping season, but many vendors are rolling out deals early as to entice online users to visit their web sites …
The rise of unsolicited and malicious emails
October saw spammers exploiting the themes of upcoming holidays, the names of well-known telecommunication service providers and the conflict in Syria, according to Kaspersky …
F-Secure launches KEY, a secure password manager
F-Secure Key safely stores your passwords, user names and other credentials so that you can access them wherever you are through one master password. Your personal data is …
BYOD is an applications strategy, not just a purchasing policy
Bring your own device (BYOD) is not just a purchasing policy and needs to be approached more broadly with the applications and strategies designed for today’s world, …
Featured news
Resources
Don't miss
- OpenAI expands its cyber defense program with GPT-5.4-Cyber for vetted researchers
- The exploit gap is closing, and your patch cycle wasn’t built for this
- Coordinated vulnerability disclosure is now an EU obligation, but cultural change takes time
- Legitify: Open-source scanner for security misconfigurations on GitHub and GitLab
- Product showcase: Stop secrets from leaking through AI coding tools with GitGuardian