Help Net Security
Declaring personal data bankruptcy and the cost of privacy
In the digital economy, your data profile has value, but judging from what I watched happen recently in a London shopping mall, a lot of us give it away for free. At the …
Lepide Exchange Recovery Manager 15.0 released
Lepide Software released version 15.0 of Lepide Exchange Recovery Manager. The latest version allows users to add Office 365 as Source directly in Lepide Exchange Recovery …
Visual hacking exposed
While most security professionals focus on thwarting data breaches from cyber attacks, a new study exposes visual hacking, a low-tech method used to capture sensitive, …
6 steps for effective rights management
Significant data breaches in both government and industry are in the headlines at an unrelenting pace. Some of these breaches are enormous in scale and impact, and all have …
Endpoint security becoming critical focus area
Detecting and responding to modern threats on endpoints has become a key business priority according to a survey by the Enterprise Strategy Group. They polled 340 IT and …
GnuPG 2.0.27 released
GnuPG is a complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system as …
Certifying ICS/SCADA professionals
An online survey and interviews with experts from EU Member States and worldwide, analyses how current initiatives on the certification of professional skills are related to …
Arabic cyber espionage group attacking high profile victims
Kaspersky Lab discovered Desert Falcons, a cyber-espionage group targeting high profile organizations and individuals from Middle Eastern countries. The list of targeted …
What’s critical to the success of the Internet of Things?
Managing identities and access is critical to the success of the Internet of Things (IoT), but in its current form identity and access management (IAM) cannot provide the …
Hackers and makers to meet in Amsterdam at HITB Haxpo
This year’s Hack In The Box Security Conference in Amsterdam will once again feature the HITB Haxpo. This technology expo for hackers, makers, builders and breakers, …
Equation Group: Cyber espionage, compromising HDD firmware, sophisticated malware
For several years, the Kaspersky Lab Global Research and Analysis Team (GReAT) has been monitoring more than 60 advanced threat actors responsible for cyber-attacks worldwide. …
Banking Trojan Dyreza sends 30,000 malicious emails in one day
A massive spam wave is installing banking Trojan Dyreza on tens of thousands of computers to steal sensitive financial data from unsuspecting customers, warns Bitdefender. …
Featured news
Sponsored
Don't miss
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations