Help Net Security
Black hole routing: Not a silver bullet for DDoS protection
As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the …
The business and social impacts of cyber security issues
With multiple recent high profile attacks targeting household names and large employers, individuals increasingly fear cyber crime and its resulting consequences at work as …
Companies expects others to protect them against DDoS attacks
One in five businesses surveyed believe that their online services should be protected against DDoS attacks by their IT service providers (in particular, network providers). …
Healthcare security spending to reach US$10 billion by 2020
The healthcare sector is ill-prepared for the new cyberage. Hospitals, clinics, trusts, and insurers are under attack from malicious online agents. The value of personal …
New DDoS attack and tools use Google Maps plugin as proxy
Attackers are using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching DDoS attacks. A known vulnerability in a Google Maps plugin for …
3 million strong RAMNIT botnet taken down
The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through …
Known weaknesses plague the security threat landscape
Well-known issues and misconfigurations contributed to the most formidable threats in 2014, according to HP Security Research. “Many of the biggest security risks are …
Addressing cybersecurity business disruption attacks
Although the frequency of a cybersecurity attack on a large scale is low, by 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity …
Internet of Things adoption is gaining momentum
Enterprise adoption of the Internet of Things (IoT) is starting to gain momentum, fueled by a mix of technological, political and social factors. The declining costs of …
Insider threats continue to dominate
Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider …
Continuous Diagnostics and Mitigation capability requirements need re-prioritization
There is a lot to like in the $6 billion Continuous Diagnostics and Mitigation (CDM) program being administered by the DHS across more than 100 federal civilian agencies. The …
Mobile apps left vulnerable for months
McAfee Labs researchers found that mobile app providers have been slow to address the most basic SSL vulnerabilities: improper digital certificate chain validation. In …
Featured news
Sponsored
Don't miss
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations
- How to start your cybersecurity career: Expert tips and guidance
- MISP: Open-source threat intelligence and sharing platform