Help Net Security
Patching for industrial cyber security is a broken model
New research from Belden shows that patching is often ineffective in providing protection from the multitude of vulnerability disclosures and malware targeting critical …
Apple releases OS X 10.8.3
The 10.8.3 update is recommended for all OS X Mountain Lion users and includes features and fixes that improve the stability, compatibility, and security of your Mac. The …
Identity fraud is up, but banks are up to the security challenge
In 2012, the total losses resulting from account takeover and new account fraud each rose by approximately 50% over the previous year. These two fraud types impact consumers …
Microsoft continues to focus on security in their products
86% of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or “third-party”) programs. The result was published today in the …
Database security is too complex to implement
A recent GreenSQL survey of IT professionals worldwide concluded that 31.4% of security professionals believe that database security implementation is too complex, making it …
Hacker to business owner: Spotting innate talent in others
There has been much debate recently in the UK about the current GCSE exam format. On the one side are those that argue it should be scrapped in favour of a complex testing …
Governance and assurance guidance for big data
Big data can save big money. A recent McKinsey report found that value gained from data in the US health care sector alone could be more than US $300 billion every year. But …
Fight cybercrime with a visit to Infosecurity Europe 2013
Over the last year we have witnessed security attacks against the worlds’ largest organisations, and cyber-attacks which have increasingly been viewed as one of the …
Mandiant threat report on advanced targeted attacks
Mandiant released its fourth annual M-Trends report, which details the tactics used by threat actors to compromise organizations and steal data. It also highlights incident …
CSOs must adopt new risk management trends
Wisegate released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach. Security …
(IN)SECURE Magazine issue 37 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 37 has been released today. Table of contents: …
Metasploit supports Kali Linux free security auditing toolkit
Rapid7 is working with Offensive Security to provide official Metasploit support for Kali Linux, the enterprise-ready evolution of BackTrack Linux. The free security auditing …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC