Help Net Security
Top words cybercriminals use in fake emails
The top words cybercriminals use create a sense of urgency, to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional …
Ethics of Big Data
What are your organization’s policies for generating and using huge datasets full of personal information? Ethics of Big Data examines ethical questions raised by the …
Big Data grows as data security shrinks
A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of “Big Data,” most organisations are actually keeping looser tabs …
Decoding digital danger: The ever-moving threat
It was announced recently that GCHQ, the Government’s electronic intelligence unit, is to advise Britain’s senior business leaders on how to oppose the mounting …
Gartner says Windows 8 is a big gamble
Microsoft is taking a big gamble over the next few months with Windows and Office, the two products responsible for most of its revenue and profit, according to Gartner. It is …
Learning Unix for OS X Mountain Lion
Beneath OS X easy-to-use GUI interface lies a powerful Unix engine. Mac users have Unix, as well as a host of tools ported over from Linux, at their fingertips; the just need …
Week in review: IE zero-day patched, Flame C&Cs reveal more malware, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Google adds Do Not Track support to Chrome The next official release of …
Ex-CME programmer admits to stealing source code
A former senior software engineer for Chicago-based CME Group pleaded guilty to theft of trade secrets for stealing computer source code and other proprietary information …
Key components for mobile device management of BYOD
The Cloud Security Alliance (CSA) Mobile Working Group released a research report identifying 17 key elements that are critical for organizations to consider for the full …
Moving federal mission-critical applications to the cloud
As federal agencies are making cloud progress, the early-adopters that are moving their mission-critical applications to the cloud are realizing cost savings and improved …
SUSE Manager update streamlines Linux management
SUSE released SUSE Manager 1.7 of its systems management solution for enterprise Linux environments. SUSE Manager’s capabilities help enterprises to comprehensively …
ActivClient Mobile SDK for iOS released
HID Global released the ActivClient Mobile SDK for iOS. Application developers, enterprises, government entities and other organisations will benefit from this SDK with …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence