Help Net Security
New books: Beautiful Testing, Core Data, RESTful Java with JAX-RS
Beautiful Testing offers 23 essays from 27 leading testers and developers that illustrate the qualities and techniques that make testing an art. Through personal anecdotes, …
Data breach costs increase
The 2009 Ponemon Institute benchmark study examines the costs incurred by 45 organizations after experiencing a data breach. Results were not hypothetical responses; they …
Cloud computing brings changing security risks
Cloud-based services are fast becoming established as a credible alternative to existing server-based IT solutions but organizations are failing to recognize the new security …
Rogue software details: LiveProtection
LiveProtection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
China denies cyber attack on Google
The Chinese government has repudiated the claims that it has been involved in the recent attacks against Google and other US companies. According to BBC News, they say that …
IT spending to grow in 2010
A slow but steady improvement in the macroeconomic environment in 2010 should support a return to modest growth in overall IT spending, according to Gartner. Worldwide IT …
10 tips for securing the public sector
Those working in the public sector need to tackle key security issues if they want to avoid costly data breaches that impact both finances and reputation. Human error is …
Hot information security topics at InfoSec World 2010
InfoSec World will be taking place on April 19-21, 2010 in Orlando. With multiple tracks, dozens of case studies, 12 in-depth workshops and three specialized summits, InfoSec …
Week in review: SASFIS Trojan, phishing escalation and IE patch
Here’s an overview of some of last week’s most interesting news and articles: Online cybercriminal DarkMarket closed, founder arrested DarkMarket has been shut …
95% of email is spam
The European Network and Information Security Agency (ENISA) released its new spam report which looks at spam budgets, impact of spam and spam management. The survey targeted …
MiFi security weakness highlights need for code auditing
News reports that the GPS-enabled Wireless MiFi unit can be persuaded to reveal its position across the internet – without the user being aware of the information leak …
Need for better identity protection
Online banking continues to provide significant levels of convenience for consumers, with quick access to checking and savings accounts, the ability to pay bills …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade