Help Net Security
Microsoft to pay up to 150k for vulnerabilities
After years of saying that bug bounties are not the best way to go about getting crucial product vulnerability information in the long run, Microsoft has done an about-face …
Customized spam uses cell phone users’ data against them
US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile. For the first time, mobile …
Employees biggest IT threat to businesses
Despite British small and medium sized enterprises (SMEs) providing training in IT and security, employees fail to prevent breaches and data leaks, according to McAfee. Even …
(IN)SECURE Magazine issue 38 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 38 has been released today. Table of contents: …
Failed backups endanger revenue and productivity
SMBs are losing critical business information as a result of failed backups, and have suffered significant impacts as a result, according to GFI Software. Many IT …
Oracle releases critical security updates for Java
Oracle released 40 new Java security fixes. 37 of the vulnerabilities may be remotely exploitable without authentication. This was described as the possibility of being …
Businesses not fully implementing infosec programs
Many U.S. small businesses are taking a passive approach when it comes to protecting their data leaving themselves vulnerable to data loss and possible financial and …
The security of WordPress plugins
Checkmarx’s research lab identified that more than 20% of the 50 most popular WordPress plugins are vulnerable to common Web attacks, such as SQL Injection. Furthermore, …
Free anti-spam software for the Mac
Cloudmark announced the latest version of Cloudmark DesktopOne for Mac, an anti-spam solution that users can use to filter email to eliminate messaging threats, protecting …
Is accessing work apps on the move destructive?
There’s a lack of mobile working policies can lead to destructive consequences for businesses, according to Ping Identity. On a regular basis, 44% of employees access up …
New regulation for ENISA, the EU cybersecurity agency
EU cybersecurity agency ENISA has received a new Regulation, granting it a seven year mandate with an expanded set of duties. ENISA’s Executive Director, Professor Udo …
Key obstacles to effective IT security strategies
Drawing on data gathered from a total of 3,037 individuals – 1,944 technicians and 1,093 executives – in the United States, Canada, United Kingdom, Australia, …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation