Help Net Security
The rise of everyday hackers
Veracode released its annual State of Software Security Report, which includes research on software vulnerability trends as well as predictions on how these flaws could be …
Week in review: Carberp Trojan developers arrested, thousands of compromised Apache servers directing users to malware
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Hackers attacking US banks are well-funded, expert says The Cyber …
10 best practices for securing data in Hadoop
Dataguise released ten security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and …
Microsoft to release 9 advisories on Tuesday
April 2013 advance notice is out and it forecasts an interesting patching session for Microsoft administrators. There are 9 advisories affecting 16 distinct platforms in 5 …
Tips for securely using free Tube Wi-Fi
GFI Software warned of potential data and device security concerns posed by using London’s public Wi-Fi service, installed across large parts of the London Underground …
Destroy solid state storage and optical media
Data Security unveiled their SSMD-2mm Destruction Device which disintegrates solid state and optical media to particles 2mm in size or smaller. NSA has evaluated the SSMD-2mm …
Malware attacks occur every three minutes
Malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy …
Ciphertex releases 24TB portable, secure NAS server
The new 24TB portable, highly secure NAS server from Ciphertex is meant for backup, disaster recovery and business continuity, file sharing and virtualization. “The …
Security professionals don’t have secure mobile habits
Security professionals have embraced BYOD and they’re taking “anytime, anywhere” access to some pretty interesting locations according a new survey by Ping …
DIY: Using trust to secure embedded projects
This talk from Shmoocon 2013 provides a DIY guide to using Trusted Computing on embedded devices. The authors introduce a low-cost schematic using Atmel’s CryptoModule …
Tips for avoiding tax scams
As the April 15 deadline for tax filing draws near, the Center for Internet Security (CIS) helps users recognize tax-related scams and better defend against them. Findings …
F-Secure rebuilds free Online Scanner
F-Secure’s free Online Scanner tool has been completely rebuilt to be faster, lighter and more powerful than before, and now even cleans up advanced rootkits, the most …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days