Help Net Security
Hack air-gapped computers using heat
Ben-Gurion University of the Negev (BGU) researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way …
Sensitive data resides in the cloud
With the vast majority of enterprises now making use of cloud environments, 54 percent globally reported keeping sensitive information within the cloud, according to …
Four advantages of an identity behavior-based approach to cybersecurity
With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 …
Most parents don’t know how to tackle cyber bullying
54 percent of UK parents would have no idea if their child was being cyber bullied, highlighting that most parents are completely ill-equipped and under-educated in knowing …
Tails 1.3.1 emergecy release fixes security issues
Tails 1.3.1, is out. This is an emergency release, triggered by an unscheduled Firefox release meant to fix critical security issues. This version fixes numerous security …
Trumping cybercriminals during tax season: Tips on how to stay safe
Tax season is stressful for many reasons and April 15 equals a headache for many Americans. In addition to wading through taxes, tax season also opens up a new vector in which …
Week in review: Security risks of networked medical devices, mobile apps still vulnerable to FREAK attacks
Here’s an overview of some of last week’s most interesting news and articles: Why senior managers need to be involved in data security There is now a growing …
Mobile app developers are not investing in security
Nearly 40 percent of large companies, including many in the Fortune 500, aren’t taking the right precautions to secure the mobile apps they build for customers. A new …
IT pros are taking action against the insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organizations. Currently 56% of IT professionals in the US …
Signature antivirus’ dirty little secret
If you rely only on traditional, signature-based antivirus, you are going to get infected—and probably a lot! Antivirus was, and still is, a valuable addition to your layered …
Security risks of networked medical devices
Networked medical devices linked to the Internet of Things (IoT) hold tremendous promise if security is built in from the outset, according to a new report by Intel Security …
Many admit that passwords are their only IT security measure
New research from SecureAuth shows that despite much debate, the password isn’t dead yet as two in five IT decision makers (ITDMs) admit that passwords are their only IT …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption