Help Net Security
OnionDog APT targets the infrastructure industry
The Helios Team at 360 SkyEye Labs revealed that a group named OnionDog has been infiltrating and stealing information from the energy, transportation and other infrastructure …
Submissions open for CommSec Track at HITBSecConf Amsterdam
Alongside HITB2016AMS’s CommSec Exhibition Village there will be a separate CommSec Track (26 – 27 May). Hackers, makers, builders and breakers are invited to send …
Sophisticated threats dictate future response strategies
Trend Micro released its annual security roundup report which dissects the most significant security incidents from 2015. The research confirms attackers are now bolder, …
New Seagate 10GB/s SSD drive ideal for hyperscale data centers
Seagate unveiled a production-ready unit of the fastest single SSD demonstrated to date, with throughput performance of 10 GB/s. The unit, which is expected to be released …
RSA Conference 2016: The infosec glass house?
A couple of years late to the party, but I finally made it to San Francisco with a real sense of excitement to attend what was described to me as the “Super Bowl of the …
IoT adoption is driving the use of Platform as a Service
The widespread adoption of the Internet of Things (IoT) is driving platform as a service (PaaS) utilization. Gartner predicts that, by 2020, more than 50 percent of all new …
Attackers will target U.S. power systems
A hack on the Ukrainian power grid in late 2015 “blacked out more than 225,000 people,” according to Claims Journal, which described this type of attack as a …
UK businesses fail at security awareness
UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and …
Password sharing habits prioritize convenience over security
A new survey by LastPass on the password sharing habits of UK consumers reveals they favour convenience over security when it comes to sharing passwords. 55 per cent of UK …
My reflections after visiting RSA Conference 2016
RSA Conference has long been the place where security vendors announce new products and services, and industry trends are made. I was told by Centrify that recent breaches …
BorgBackup: Deduplication with compression and authenticated encryption
BorgBackup is a deduplicating backup program that supports compression and authenticated encryption. The main goal of BorgBackup is to provide an efficient and secure way to …
Week in review: DROWN attack breaks TLS encryption, hijacking police drones, RSA Conference 2016 coverage
Here’s an overview of some of last week’s most interesting news, reviews and articles: RSA Conference 2016 coverage Check out our coverage page to see what …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways