Help Net Security
Cloud-based security services still in high demand
By 2015, 10 percent of overall IT security enterprise product capabilities will be delivered in the cloud, according to Gartner. The services are also driving changes in the …
TDoS: The latest wave of Denial of Service attacks
Hackers have been able to weasel their way into computer networks from nearly every direction. From malware to ransomware, and everything in between, cyber crooks are always …
Real-world test of 21 antivirus products
AV-Comparatives have released results of their latest Real-World Protection Test. These show that in a real-world digital environment with ever-increasing malicious programs, …
Employees admit to accessing or stealing private company information
In a survey of 1,000 employers by LogRhythm, 80 percent do not believe any of their workers would view or steal confidential information, while three quarters (75 percent) …
INTERPOL Chief on fighting cybercrime worldwide
INTERPOL Secretary General Ronald K. Noble has said that global efforts against cybercrime and to enhance cyber security require law enforcement and private sector Internet …
Week in review: Hijacking airplanes with an Android phone, and a call to arms for infosec professionals
Here’s an overview of some of last week’s most interesting news, articles and videos: Spear-phishing emails targeting energy companies Information over-sharing can …
Sophisticated threats and thinking like the attacker
Sophisticated attackers are making us think differently about how we approach security. They are methodical, persistent, creative and often times well funded. Approaching …
Sentinel Envelope ensures code integrity and app security
SafeNet announced the availability of its third-generation Sentinel Envelope technology, which helps software developers protect code integrity and deliver application …
Private file storage and sharing app from Gemalto
Gemalto has extended its portfolio of end-user cloud services solutions for mobile network operators with an innovative private file storage and sharing application. LinqUs …
BirdStep updates SafeMove mobile VPN solution
Birdstep Technology released SafeMove Mobile VPN 7.0 (MVPN), which introduces several features, including performance, manageability and user experience improvements. Windows …
You’ve been hacked, now what?
Given the increased frequency and complexity of cyber attacks on business networks of all sizes, the odds of experiencing a breach is almost guaranteed if the right security …
Controlling the physical world with BacNET attack framework
The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often …
Featured news
Resources
Don't miss
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work
- Energy sector orgs targeted with AiTM phishing campaign
- Exposed training apps are showing up in active cloud attacks