Help Net Security
Beginning of a new era: The digital industrial economy
Worldwide IT spending is forecast to reach $3.8 trillion in 2014, a 3.6 percent increase from 2013, but it’s the opportunities of a digital world that have IT leaders …
Webroot delivers data, identity and threat protection
Webroot released the latest updates to its Webroot SecureAnywhere portfolio. The latest release brings new detection technology to block emerging malware and phishing attacks …
Most unauthorized data access goes undetected
With a focus primarily on large enterprise organizations, a Vormetric study of 700 IT security decision-makers indicates that there are major gaps between existing security …
Vulnerable and aggressive adware threatening millions
FireEye discovered a new mobile threat from a popular ad library that no other antivirus or security vendor has reported publicly before. Mobile ad libraries are third-party …
How to establish trust in the cloud
Business is increasingly taking place outside the corporate firewall. Employees are using their own devices and turning to consumer-grade cloud file sharing services to allow …
Video: How the grid will be hacked
There is a never ending stream of vulnerabilities in the mechanical and cyber systems that support the grid. So, why hasn’t there been any significant breach of the …
GnuPG 2.0.22 fixes security problem
GnuPG 2.0.22 is a security fix release and all users are advised to updated to this version. What’s new: Fixed possible infinite recursion in the compressed packet …
Enterprise tech projects increasingly funded by business, not IT
According to a new IDC survey of 1,200 line of business executives, 61% of enterprise technology projects are now funded by the business rather than the IT department, and IT …
Emulex releases appliance for cloud, security and mobile deployments
Emulex announced the new EndaceFlow 3040 NetFlow generator appliance, which is purpose-built for use with high-density 10GbE networks, generates 100 percent accurate NetFlows …
Week in review: Adobe breach, Silk Road takedown, and the future of information security
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: The impact of false positives on web application security …
Reactions from the security community to the Adobe breach
Hackers have breached Adobe’s network and have made off with personal, account, and encrypted financial information of nearly 3 million Adobe customers, as well as the …
Microsoft to unveil eight bulletins on Tuesday
October is turning out to be a busy month for patches. Next week is Patch Tuesday, and both Adobe and Microsoft have published their advance notices, with one and eight …
Featured news
Resources
Don't miss
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help