Help Net Security
Lack of awareness for PCI DSS 2.0
New research by LogLogic has indicated that 13.8 percent of respondents are completely unaware of the new version and 15.5 percent confirm they are only partially aware of it. …
Microsoft patches record 40 vulnerabilities
Today Microsoft released 17 security bulletins which address 40 vulnerabilities affecting Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange. This …
2010: The year of the vulnerability
The year 2010 has been almost identical to the previous one in terms of malware evolution. Generally speaking, trends have not changed that much and nor have the targets for …
Hacktivism and social engineering emerge as top threats
Hacktivism and more profit-oriented malware, social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year, …
Top wireless security trends for 2011
Today’s security needs are different than they were a decade ago. People are ‘connected’ thanks to mobile devices so they can stay linked to their security …
Smart grid cyber security in 2011: Untenable meets intractable
In the presentation below, you can listen to Andy Bochman, the Energy Security Lead at IBM, looking back and looking forward on smart grid cyber security. Andy takes a look at …
Metasploit achieves CVE compliance
Rapid7 announced that Metasploit Pro and Metasploit Express have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security …
Use Android as a RSA SecurID authenticator
RSA announced their SecurID Software Token for Android that is engineered to enable an Android powered device to be used as an RSA SecurID authenticator, providing convenient …
First 1TB 2.5-inch enterprise HDD
Seagate introduced Constellation.2, the first 2.5-inch enterprise-class hard drive to reach 1TB capacity. The drive is designed for server storage applications and offers a …
Data privacy a primary concern in the smart grid world
Privacy has emerged as the number one concern related to data security and management, with data governance as an emerging concern, according to IDC Energy Insights. As …
Operation Payback and hacktivism 101
Hacktivism is the use of cyber attacks and sabotage to communicate and promote politically motivated causes. It has been around as long as the internet. Sole hacktivists have …
Data protection compliance in the EU administration
The European Data Protection Supervisor (EDPS) adopted a policy paper that sets out the framework within which he monitors, measures and ensures data protection compliance in …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways