Help Net Security
B-Sides Vienna welcomes hackers in June
B-Sides Vienna is a hacker conference targeted at security researchers, system and network operators, application developers, hardware hackers, hackerspace members, and …
Maturity model for information security management
The Open Group announced a new information security management standard, The Open Group Information Security Management Maturity Model (O-ISM3), which enables the creation of …
Network security blunders: Tales from the field
We’ve all made one in our career, I’m talking about that blunder you thought you would be fired for. My first blunder was rebooting all the campus router pairs at …
Week in review: Epsilon breach, MITM attacks and the execution of the RSA hack
Here’s an overview of some of last week’s most interesting news, reviews, videos and articles: The execution of the RSA hack More than two weeks have passed since …
Cain & Abel 4.9.40 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Hacking Unified Communications security
A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …
Uptick in rogue Facebook applications
GFI Software announced the top 10 most prevalent malware threats for the month of March 2011. GFI researchers found that the Japanese tsunami, earthquake and subsequent …
Smartphone users feel more secure than PC users
Many users feel more secure using smartphones to surf the Internet than PCs, and a majority consider the risk of losing personal data higher on computers than on smartphones, …
AVG unveils secure cloud-based storage
AVG Technologies launched AVG LiveKive, a cloud-based storage, sync and share solution. It offers consumers a way to access their personal information, data, files and digital …
Multiple vulnerabilities in Moonlight
Some vulnerabilities have been reported in Moonlight, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security …
Most global energy organizations suffered a breach
More than 75 percent of global energy organizations surveyed admit to having suffered at least one data breach over the last 12 months. Furthermore, 69 percent of …
The true scale of the insider threat
UK employees are likely to either maliciously or accidentally disclose confidential information about their employers to unauthorized personnel. A LogRhythm survey of 3000 UK …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated