Help Net Security
A closer look into the piracy ecosystem
Illegal reproduction and distribution of copyrighted material on the Web is booming as a result of security breaches in both mobile and desktop software applications.Arxan and …
Rise in DDoS reflection attacks using abandoned routing protocol
There’s been an increase in the use of outdated Routing Information Protocol version one (RIPv1) for reflection and amplification attacks, according to Akamai.RIPv1 is a …
Updated Point-to-Point Encryption standard now provides more flexibility
The Payment Card Industry Security Standards Council (PCI SSC) published an important update to one of its eight security standards, simplifying the development and use of …
Multi-link network encryptor with 100 Gbps encrypted bandwidth
Gemalto released its new SafeNet Multi-Link High Speed Encryptor (HSE) solution that provides the equivalent of 10 by 10 Gbps high-speed encryptors in one unit. With a total …
(IN)SECURE Magazine issue 46 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 46 has been released today.Table of contents: The …
Four essential tips that you can use to stay safe when you travel
Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your cyber …
Confidence in antivirus falls to all-time low
While concern for end-user risk persists, confidence is waning in traditional detection-based security solutions, such as antivirus and firewalls. Instead, interest is …
Worldwide IT spending to decline 5.5 percent in 2015
Worldwide IT spending is on pace to total $3.5 trillion in 2015, a 5.5 percent decline from 2014, according to the latest forecast by Gartner, Inc. Analysts attribute the …
Why vulnerability disclosure shouldn’t be a marketing tool
There have been many arguments within the security community on how researchers should disclose the existence of a security vulnerability. Some argue that full disclosure is …
NIST revises security publication on random number generation
In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for …
Security concerns continue to dog the cloud industry
Executives at major North American companies believe conventional network security solutions aren’t enough to protect their cloud computing environments, especially when it …
5 ways to stop the Internet of Things from becoming the Internet of Thieves
The Internet of Things is here and is now on your wrist, in your pocket, in your car, and maybe even in your socks. From smart watches and self-driving cars to smart …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption