Help Net Security
Secure computing on a USB flash drive
The new IronClad USB drive shrinks a laptop’s hard drive – including the entire operating system, software applications, and files – onto a secure flash …
Four information management roles IT departments need
Gartner has identified four information-management roles that IT departments need to establish and recruit from outside the IT team in a major trend that will affect both IT …
Identity theft in focus
The stories are all too familiar: Money siphoned from a checking account. Unfamiliar charges racked up on a credit card bill. Discovering a loan has been taken out under false …
Week in review: Google and Adobe hacked by China, threats 2.0 and rogue Android applications
Here’s an overview of some of last week’s most interesting news and articles: Pay by password Verotel announced Verotel QuickCharge – a new tool for Internet …
8,378 reasons for better banking security
Reports that the Suffolk County Bank – a subsidiary of Suffolk Bancorp, the US financial institution – had its banking servers hacked last November were met with …
Attackers exploiting unpatched vulnerability in Internet Explorer
Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. There are active attacks attempting to use this vulnerability against Internet …
Top 3 tips for virtual infrastructure protection
Flexible infrastructure If you already have a disaster recovery solution in place make sure that it is flexible enough to be used for physical and virtual server platforms. …
Mobile security market to exceed $4 billion by 2014
Strong enterprise demand for data security is driving rapid growth in mobile device management services. According to a study by ABI Research, the number of smartphones …
Top 10 information security threats for 2010
“The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they’ll be facing in …
Continuing evolution of Internet threats
Spammers continue to be cutting-edge marketers, this time taking advantage of the reputations of global brands, such as UPS, DHL and Facebook, to prompt opening of emails. …
Chinese attacks gear Google to focus on security and privacy
Google acted correctly in ending self-censorship of its Chinese search engine, Google.cn, but the cyber attacks that prompted the decision demonstrate the company must give …
New CRISC certification for risk professionals
The Certified in Risk and Information Systems Control (CRISC) designation from ISACA is for IT professionals who identify and manage risks through the development, …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)