Help Net Security
Four information management roles IT departments need
Gartner has identified four information-management roles that IT departments need to establish and recruit from outside the IT team in a major trend that will affect both IT …
Identity theft in focus
The stories are all too familiar: Money siphoned from a checking account. Unfamiliar charges racked up on a credit card bill. Discovering a loan has been taken out under false …
Week in review: Google and Adobe hacked by China, threats 2.0 and rogue Android applications
Here’s an overview of some of last week’s most interesting news and articles: Pay by password Verotel announced Verotel QuickCharge – a new tool for Internet …
8,378 reasons for better banking security
Reports that the Suffolk County Bank – a subsidiary of Suffolk Bancorp, the US financial institution – had its banking servers hacked last November were met with …
Attackers exploiting unpatched vulnerability in Internet Explorer
Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. There are active attacks attempting to use this vulnerability against Internet …
Top 3 tips for virtual infrastructure protection
Flexible infrastructure If you already have a disaster recovery solution in place make sure that it is flexible enough to be used for physical and virtual server platforms. …
Mobile security market to exceed $4 billion by 2014
Strong enterprise demand for data security is driving rapid growth in mobile device management services. According to a study by ABI Research, the number of smartphones …
Top 10 information security threats for 2010
“The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they’ll be facing in …
Continuing evolution of Internet threats
Spammers continue to be cutting-edge marketers, this time taking advantage of the reputations of global brands, such as UPS, DHL and Facebook, to prompt opening of emails. …
Chinese attacks gear Google to focus on security and privacy
Google acted correctly in ending self-censorship of its Chinese search engine, Google.cn, but the cyber attacks that prompted the decision demonstrate the company must give …
New CRISC certification for risk professionals
The Certified in Risk and Information Systems Control (CRISC) designation from ISACA is for IT professionals who identify and manage risks through the development, …
Adobe fixes critical vulnerabilities in Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.2 and Acrobat 9.2 for Windows, Macintosh and UNIX, and Adobe Reader 8.1.7 and Acrobat 8.1.7 for Windows and …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC