Help Net Security
70% of finance apps vulnerable to input validation attacks
A growing number of data breaches and security incidents can be directly linked to poor code quality, according to CAST. The data reveals finance and retail industry …
10 most significant software security design flaws
The IEEE Center for Secure Design, a cybersecurity initiative focused on the identification of software design flaws, released a report based on real-world data collected and …
Why every security-conscious organization needs a honeypot
You’ve probably heard the phrase about “canaries in a coal mine.” In the mid 1900s, a guy named John Haldane figured out that birds die pretty quickly when …
Former HHS cyber security director convicted for child porn
The former acting director of cyber security at the U.S. Department of Health and Human Services was convicted by a federal jury in the District of Nebraska of engaging in a …
470 million sites exist for 24 hours, 22% are malicious
Blue Coat researchers analyzed more than 660 million unique hostnames requested by 75 million global users over a 90-day period. They found that 71 percent of the hostnames, …
More students bringing mobile devices to class
Just like professionals, more and more students are taking their own devices with them. BYOD, a trend in the business world, is also gaining popularity in schools. With …
NYU launches largest cyber security student contests
Even before the academic semester starts, students from across the globe have begun registering for the largest set of student cyber security competitions in the world: the …
8 ways to talk security with executive management
The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive …
Identity theft vendor sentenced to 100 months in prison
A northern California man who served as an information and document vendor in the identity theft and credit card fraud ring known as Carder.su was sentenced yesterday to serve …
D-Link releases DWL-8610AP Wi-Fi AP with security features
D-Link announced the DWL-8610AP, a new high power, 802.11ac unified wireless access point. Rich with advanced radio management and security features, it allows IT …
Week in review: Securing networks in the IoT era, and taking control of Android app permissions
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Breaking the security of physical devices In this podcast …
Sneak attack through smartphone shared memory
A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of …
Featured news
Sponsored
Don't miss
- Ransomware gang targets IT workers with new RAT masquerading as IP scanner
- Researchers unearth MotW bypass technique used by threat actors for years
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment