Help Net Security
An unsecured computer is worse than an unlocked home
Using a computer without security is riskier than leaving your home or car unlocked. In a survey of 1,637 Internet users aged 18 and older, Webroot asked respondents to gauge …
Poor internal security processes spell disaster
Poor internal security management processes present more risk than malicious threats. More than 50 percent of an AlgoSec survey respondents incurred a system outage due to an …
Mobile devices expose company data to vulnerabilities
Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices …
Linksys Wi-Fi routers with app enabled capabilities released
Cisco unveiled a new line of Linksys Smart Wi-Fi Routers with app enabled capabilities. The three new routers offer support for Cisco Connect Cloud, which provides anytime, …
Smart meters vulnerable to false data injection
Power grids connect electricity producers to consumers through interconnected transmission and distribution networks. In these networks, system monitoring is necessary to …
Establishing a GRC program with Keylight Platform
LockPath released Keylight Platform 2.3 which gives users the ability to upload data files (.xls and .csv) and import them directly into DCF tables. In addition, Threat …
SecureZIP Reader for iOS released
PKWARE announced SecureZIP Reader for iOS, an application that secures enterprise and government data on phones and tablets. The SecureZIP solution secures corporate …
Using Mac OS X Lion Server
If you’re considering a Mac OS X server for your small business, school, nonprofit, or home network, Using Mac OS X Lion Server will help you get up and running in no …
Week in review: First Android bootkit, Global Payments breach, and how to do BYOD the right way
Here’s an overview of some of last week’s most interesting news, podcasts, interviews, videos and articles: Penetration testing tips, tricks and unusual situations …
Five steps to enhance mobile device security
Mobile devices are quickly becoming a target rich and high return on investment environment for malicious attackers. Their use is expected to surpass the use of existing …
Microsoft to release four critical bulletins
The Microsoft Security Bulletin Advance Notification for April 2012 contains six bulletins. The number of bulletins isn’t huge but the potential harm is great. Of the …
It’s official, corporate passwords are cheap
Nearly 50 per cent of employees would readily sell their corporate passwords for less than £5, according to Ping Identity. 30% would do the deed for even less, happily …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility