Help Net Security
Video: Malware Management Framework
You can throw lots of time and money at scanning your systems for unknown malware, but the reality is that you will only identify a small portion of the bad stuff. Changing …
Plan to fail for better security
We’ve all heard the old saying: “If you fail to plan, you’re planning to fail.” Of course, it’s true: and from a security viewpoint, it’s …
How CISOs get executive buy-in for security budgets
Wisegate released a new report that shares how CISOs successfully gain executive buy-in on security budgets and strategically manage them. Most CISOs face significant …
The Internet of Things: Vulns, botnets and detection
Does the Internet of Things scare you? It probably should. This DerbyCon video discusses why embedded device security is laughably bad, handling vendor notification, and …
DDoS attack size accelerating rapidly
Arbor Networks released data on global DDoS attack trends for the first three quarters of 2013. The data shows that DDoS continues to be a global threat, with alarming …
Free Android security app from Malwarebytes
Malwarebytes launched a free mobile security application for Android devices. Malwarebytes Anti-Malware Mobile, available on
Digital ship pirates: Researchers crack vessel tracking system
In the maritime business, Automated Identification Systems (AIS) are a big deal. They supplement information received by the marine radar system, are used for a wide variety …
Python for web application security professionals
Python is an open source, interactive, object oriented programming language. It’s very easy to learn and an extremely powerful high level language. It runs on Windows, …
Oracle fixes 127 vulnerabilities in its products
The story here is that Oracle has synced up their Java patching with the rest of their patching cycle and, when it comes to vulnerabilities, Java always steals the show. The …
Video: Hacking back and active defense
In this DerbyCon video, John Strand will demonstrate the Active Defense Harbinger Distribution, a DARPA funded, free Active Defense virtual machine. He will debunk many of the …
Top vertical industry predictions for IT organizations for 2014
Gartner has revealed its top industry predictions for IT organizations and users for 2014 and beyond. Most industries are facing accelerating pressure for fundamental …
Social identity theft protection
Riskive unveiled FriendGuard, a free app that leverages advanced math and science to protect individuals and families against social identity theft and malware attacking their …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation