Help Net Security
Do you need a honeypot?
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Bruce Schneier: Trust, security and society
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of …
Targeted attacks focus on small businesses
36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees, according to Symantec. During the first …
Anti-theft Wi-Fi tag for laptops and tablets
Ekahau launched its newest Wi-Fi tag, the L4 Laptop tag. The L4 tag is a small flat unit designed to be plugged into the ExpressCard slot. The tag works with the Ekahau RTLS …
CompTIA Security+ Rapid Review
Assess your readiness for CompTIA Security+ Exam SY0-301 and identify where you need to focus and practice. This practical guide walks you through each exam objective, …
Microsoft releases nine security bulletins
The Microsoft Security Bulletin Summary for July 2012 contains nine security bulletins addressing 16 CVEs. Three of the bulletins are rated critical and the other six are …
Simple safe web browsing tips
The most important thing to remember about cyber security is that people using their touchpad or mouse are the last line of defense. Technologies such as anti-virus, safe …
Security vulnerabilities of DVB chipsets
This video from Hack in The Box Amsterdam 2012 focuses on the security of audio and video MPEG streams broadcasted to subscribers via their set-top-boxes by a digital …
Microsoft acquires Perceptive Pixel
Microsoft and Perceptive Pixel announced that they have entered into a definitive agreement under which Microsoft will acquire PPI, a provider of multi-touch display …
Android Trojan attacks European banks
Recently Trusteer discovered the first Tatanga-based man in the mobile (MITMO) attack as well as new SPITMO configurations which are targeting Android mobile banking users in …
Restoring critical applications a top concern
Organizations now operate in a world where employees and customers alike expect critical services to be available and accessible at all times, and it’s forcing IT to …
Websense TRITON now with new malware and data theft defenses
Websense announced 10 new malware and data theft defenses, spear phishing protection with cloud sandboxing, and a forensic reporting dashboard with security intelligence. With …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated