Help Net Security
Defending against the BREACH attack
When Juliano and Thai disclosed the CRIME attack last year, it was clear that the same attack technique could be applied to any other compressed data, and compressed response …
Silent Text for Android now on Google Play
Silent Text for Android is now available for download in the Google Play store. It allows you to have secure and encrypted peer-to-peer text conversations on your mobile …
Experienced employees more important than a rising security budget
Tripwire announced the results of a survey of 167 attendees at Black Hat USA 2013. Many of those surveyed – 44 percent – said that if they could change one thing …
Free tool for auditing Google Apps
BeyondTrust released PowerBroker Auditor for Google Apps, available for free, to the BeyondTrust user community. The tool was developed to ease the burdens associated with …
Analyzing the Fort Disco bruteforce campaign
In recent months, several researchers have highlighted an uptick in bruteforce password guessing attacks targeting blogging and content management systems. Arbor ASERT has …
Most companies don’t have data breach cyber insurance
Companies now rank cyber security risks as greater than natural disasters and other major business risks, according to a new Ponemon Institute study. While only 31 percent of …
Expect more Android security issues in 2013
Android vulnerabilities, increased online banking threats and availability of sophisticated, inexpensive malware toolkits are among the growing concerns cited in Trend …
IOActive launches security intelligence service
IOActive launched its new Security Intelligence Service, to help arm organizations with prioritized critical security insights based on their business. World-renowned research …
ESET Mobile Security for Android gets an update
ESET rebuilt and redesigned ESET Mobile Security for Android. The next generation mobile product offers improved scanning, Anti-Phishing module and a completely redesigned …
Dependability through Assuredness Standard released
The Open Group announces the publication of the Dependability through Assuredness Standard (O-DA), which will benefit organizations relying on complex systems to avoid or …
Cloud contracts need transparency to improve risk management
Buyers of commercial cloud services, especially software as a service (SaaS), are finding security provisions inadequate. Gartner, Inc. said SaaS contracts often have …
Top destinations for cyber security pros
Semper Secure announced the results of its Cyber Security Census. Based on a survey of 500 cyber security professionals from 40 different industries across 43 states, the …
Featured news
Resources
Don't miss
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security