Help Net Security
HITBSecConf2012: Revamped live hacking competition
What first began as a small gathering for computer security enthusiasts in 2002, Hack In The Box Security Conference (HITBSecConf) has since grown into a must attend event in …
Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights
Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights Here’s an overview of some of last …
10.8 million Android devices infected with malware
From 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals, according to NQ Mobile. In 2011, newer and more …
Tips to minimize the risk of identity fraud
Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud. Prevention 1. Keep personal data …
No skeleton key: Protecting your organization on the web
Weaknesses in the SSL protocol or the public certificate authority ecosystem that underpin it have received a lot of coverage recently and the last couple of weeks have been …
Password amnesia and online identity
The use of multiple passwords is posing a security risk to individuals and businesses alike, according to Ping Identity. A new study, which surveyed 2,000 consumers, …
NAC system PacketFence 3.2.0 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. This is a major release with new features, new hardware support, …
Application security intelligence combats mobile threats
Cenzic introduced a new application security intelligence service that secures mobile applications on all mobile platforms, via the cloud. The new solution scans and provides …
Identity fraud hits 11.6 million in the US
In 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held …
New capabilities for the IBM security intelligence platform
IBM unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to …
Six principles for effective cloud computing
The growing shift to cloud computing can deliver significant value—but most enterprises have little knowledge of the perils of transferring IT decision making away from …
Juniper Networks acquires Mykonos Software
Juniper Networks has acquired Mykonos Software, a provider of Intrusion Deception Systems that protect websites and web applications. Under the terms of the agreement, Juniper …
Featured news
Sponsored
Don't miss
- Scammers dupe chemical company into wiring $60 million
- Australian gold mining company hit with ransomware
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed