Help Net Security
Backup large data with Big Cloud
Sterling Data Storage released its largest data backup solution yet — the Big Cloud. It was designed for companies needing to securely store large amounts without sacrificing …
How secure is quantum cryptography?
Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and …
DNS anomaly detection: Defend against sophisticated malware
Not so long ago, the standard way of looking for a malware infection was to simply monitor web traffic. By looking, for example, for HTTP requests to google.com/webhp – …
Plugging the trust gap
Every business and government is dependent upon cryptographic keys and certificates to provide trust for critical communications. These trust technologies underpin the modern …
Week in review: Scanner that identifies malware strains, Twitter offers 2FA
Here’s an overview of some of last week’s most interesting news, reviews and articles: The CSO perspective on healthcare security and compliance Randall Gamby is …
Killer apps: The performance of networked applications
Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …
Fighting cybercrime is on the right track
Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …
IT security pros have trouble communicating with executives
A Hanover Research survey of 131 information security professionals revealed key differences between the way executive and non-executive IT professionals communicate with …
Teens are into online sharing, but are also more privacy-aware
Teens are sharing more information about themselves on social media sites than they have in the past, but they are also taking a variety of technical and non-technical steps …
Is it time to professionalize information security?
The issue of whether or not information security professionals should be licensed to practice has already been the topic of many a passionate debate. I think it is time to …
A spotlight on grid insecurity
Drawing from responses from more than 100 utilities across America, a new report shows that the nation’s electric grid remains highly vulnerable to attacks from Iran and …
NYPD detective accused of hiring email hackers
Edwin Vargas, a detective with the New York City Police Department, has been arrested on Tuesday for computer hacking crimes. According to the complaint unsealed in Manhattan …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)