Help Net Security
Mitigating the BEAST attack on TLS
During the summer rumours about a new attack against SSL started circulating. Then Opera released a patch, but made no comment about what it was patching. Eventually enough …
Huge threats still targeting power grids
One year ago, the Stuxnet virus had just been discovered. A year’s worth of analysis still has not unlocked its secrets but it has had a profound influence upon the …
IT execs view security and privacy as top priority
New and complex IT risks and changing business priorities challenge today’s IT leaders, according to a new survey from Protiviti. The results of the study reveal six …
Password misuse at root of hacking
48 percent of IT security professionals surveyed have worked for organizations whose network has been breached by a hacker, according to Lieberman Software. The survey paints …
Enterprise IT spending to reach $2.7 trillion in 2012
Worldwide enterprise IT spending is projected to total $2.7 trillion in 2012, a 3.9 percent increase from 2011 spending of $2.6 trillion, according to Gartner. While …
Analysis of 250,000 hacker conversations
Imperva released a report analyzing the content and activities of an online hacker forum with nearly 220,000 registered members, although many are dormant. This forum is used …
Symantec tackles malicious advertising
Symantec announced AdVantage, a new cloud-based service that will enable website owners to discover malware hidden in online advertisements. Malicious advertising …
Simple online protection steps for seniors
Older Americans, who grew up in the era of rotary-dial phones and black and white TV programming, may still be in the minority among Internet users. They are a rapidly growing …
4 million identity fraud victims in the UK
Identity fraud continues to rise with 4 million victims in UK alone – yet consumers continue to be complacent with their identities. According to research commissioned …
McAfee and RSA partner for compliance and risk management solution
McAfee and RSA announced a new joint solution which integrates security data from the McAfee ePolicy Orchestrator platform (McAfee ePO) with business infrastructure and …
Moving To The Cloud
Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors …
Week in review: Trojanized Netflix app, new Sony attack and German government’s Trojan/backdoor
Here’s an overview of some of last week’s most interesting news, articles and photos: Most social networks users don’t keep up with privacy settings changes …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act