Help Net Security
Android remote systems administration tools
Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs …
Qualys adds security experts to CTO/CSO advisory board
Qualys announced today the newest additions to its CSO/CTO Advisory Board. The four new members join information security leaders from eBay, Goldman Sachs, Microsoft, PayPal, …
Cloud data encryption for Hosted Exchange
Vaultive announced Vaultive for Hosted Exchange, a cloud data encryption solution that enables customers to encrypt data-at-rest and data-in-use within the Hosted Microsoft …
IT candidates should shift career perspectives
Recruiting in the technology sector is strong, despite weaknesses and structural changes the economy has experienced over the past several years. Enterprises seem to be …
Alternative app marketplaces prove profitable for cybercriminals
Avast researchers discovered a new batch of fake alternative marketplaces for downloading smartphone apps that trick users into sending premium rate SMS messages. Using a …
Secure online voting on iOS and Android
Scytl announced today the successful implementation of its online voting encryption technology for use on Android and iOS. By encrypting the ballot on the voter’s device …
Fuzz-o-Matic finds critical flaw in OpenSSL
Codenomicon helped identify and a critical flaw in widely-used encryption software. A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS can be …
Week in review: Massive carding ring bust, cyber attacks against US gas companies, and the creation and evolution of the superuser
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Phishers mimic OpenID to steal credentials New spam email campaigns are …
Android Cookbook
“Android has gone from zero to one of the leading mobile platforms in a few years,” explains author Ian Darwin, who crowdsourced many of the 200 …
The creation and evolution of the superuser
When I think about managing identities and privileges within an organisation, one of my favorite analogies for the whole privileged identity lifecycle is biblical. Everything …
FixMeStick: USB device for removing malware
FixMeStick has launched the first ever, consumer-ready USB device for removing viruses from infected PCs. The principles of the FixMeStick are not new to security IT …
Cybersecurity model may benefit a new cloud-based network
In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself. Scott …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility