Help Net Security
Abuse of mobile app permissions
McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy …
Explore, analyze and visualize data in Hadoop
Splunk announced the beta version of Hunk: Splunk Analytics for Hadoop, a new software product that integrates exploration, analysis and visualisation of data in Hadoop. Hunk …
Lord Sebastian Coe to keynote RSA Conference Europe 2013
RSA Conference announced Olympic champion, politician and former chair of the 2012 Summer Olympic & Paralympic Games, Lord Sebastian Coe to its lineup of keynote speakers …
Citadel Trojan automatically localizes fraud content
Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …
Attitudes towards data protection and encryption in the cloud
An increasing number of organizations are transferring sensitive or confidential data to the cloud despite concerns over data protection, according to the Ponemon Institute. …
Can DDoS attackers turn mitigation devices against you?
SYN reflection attacks are one of the more sophisticated DDoS attack methods and typically require some skill to execute. However, they have recently grown in popularity as …
Mobile and cloud data risks exposed
A new Ponemon eport focuses on the risks associated with employee access to regulated data, such as protected health and financial information, via company or personal mobile …
Advanced threat detection from Cylance available for free
The Cylance PrivateDETECT for endpoints is now ready for broad beta consumption as limited time freeware. Cylance’s technological approach is to apply big math and …
SSL Labs: Deploying forward secrecy
With revelations about mass surveillance in the news everywhere, an obscure feature of SSL/TLS called forward secrecy has suddenly become very interesting. So what is it, and …
Are cyber attacks more dangerous than physical attacks?
Eighty percent of C-level executives and IT security professionals believe that cyber attacks pose a greater risk to their nation than physical attacks, while 51 percent …
Creating a cloud security policy
Building a cloud security policy is a crucial step to take before diving into the cloud to ensure maximum benefits are achieved and data is secure. But some organizations, in …
Firefox 22 delivers 14 security updates
Mozilla released Firefox 22, which includes 14 security updates: four are critical, six high, three moderate and one low. Fixed in this version: MFSA 2013-62 Inaccessible …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation