Help Net Security
Most security pros believe they will suffer a data breach
More than 70% of IT security professionals would not be willing to bet $100 of their own money that their organization will not suffer a data breach in the next six months, …
Big Data: Huge risk or huge opportunity?
The amount of data government agencies must capture, store, and analyze is growing exponentially. Whether this data boom provides agencies with new opportunities to gain …
Disruptive tech trends that will change everything
At the opening keynote for the 43rd annual ISACA North America Computer Audit, Control and Security (CACS) Conference, New York Times personal-technology columnist David Pogue …
Study of the European data center market
Digital Realty Trust has released key findings from its annual study of the European data center market. The survey of senior leadership at large corporations in Europe …
Radware unveils SDN strategy
Radware introduced DefenseFlow, the first in the company’s suite of Software Defined Networking (SDN) applications providing organizations with network wide attack …
The Social-Engineer Toolkit 5.0 released
TrustedSec released the Social-Engineer Toolkit (SET) 5.0 codename: The Wild West. This version is a culmination of six months of development, bug squashing, and user …
Mobile malware up 163%
Mobile malware threats increased 163% to more than 65,000 in 2012, according to NQ Mobile. The problem is becoming more complex as smarter mobile malware can better target …
Cloud-based security services still in high demand
By 2015, 10 percent of overall IT security enterprise product capabilities will be delivered in the cloud, according to Gartner. The services are also driving changes in the …
TDoS: The latest wave of Denial of Service attacks
Hackers have been able to weasel their way into computer networks from nearly every direction. From malware to ransomware, and everything in between, cyber crooks are always …
Real-world test of 21 antivirus products
AV-Comparatives have released results of their latest Real-World Protection Test. These show that in a real-world digital environment with ever-increasing malicious programs, …
Employees admit to accessing or stealing private company information
In a survey of 1,000 employers by LogRhythm, 80 percent do not believe any of their workers would view or steal confidential information, while three quarters (75 percent) …
INTERPOL Chief on fighting cybercrime worldwide
INTERPOL Secretary General Ronald K. Noble has said that global efforts against cybercrime and to enhance cyber security require law enforcement and private sector Internet …
Featured news
Resources
Don't miss
- Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
- China-linked Salt Typhoon hackers attempt to infiltrate European telco
- Most AI privacy research looks the wrong way
- Why ex-military professionals are a good fit for cybersecurity
- Nodepass: Open-source TCP/UDP tunneling solution