Help Net Security
Passwords are not treated as critical to security
Considering the cyber world we live in, it’s time to ask whether passwords can still be considered a reliable security component – and if so, how should they be used? Look no …
It’s official: The average DDoS attack size is increasing
New global DDoS attack data from Arbor Networks shows strong growth in the average size of DDoS attacks, from both a bits-per-second and packets-per-second perspective.The …
Information security governance practices are maturing
Information security governance practices are maturing according to Gartner’s annual end-user survey for privacy, IT risk management, information security, business …
Top obstacles to EMV readiness
By October 1, 2015, the majority of U.S. businesses must transition to EMV-capable technologies or become newly liable for any costs incurred from fraud using old magnetic …
How gamers can help improve critical software security
There’s now a game where sophisticated gamers can help improve security of the country’s critical software. SRI International, in partnership with the University of …
How to apply threat intelligence feeds to remediate threats
IT organizations are recognizing the value of threat intelligence feeds, and that’s good. Threat intelligence is a must-have for identifying malware and other threats that …
Hardware encryption market revenue to reach $36.4 billion by end of 2015
There are a variety of ways to secure data, either on the perimeter or within the LAN, but the most fundamental method in a defense-in-depth model is hardware encryption. The …
The NYSE system crash was an infosec incident
On Wednesday, July 8, a number of information systems suffered “glitches,” causing speculation that the US may be under a coordinated cyber attack. In the morning, United …
Are IT pros overconfident in their ability to deflect attacks?
IT executives within critical infrastructure organizations see a need for public-private threat intelligence sharing partnerships (86% of respondents) to keep pace with …
Week in review: Emergency patches for actively exploited flaws, HTML5 can be used to hide malware
Here’s an overview of some of last week’s most interesting news, reviews and articles:First Java zero-day in two years exploited by Pawn Storm hackersThe flaw was …
The arsenal of SMS scammers, spammers and fraudsters
Illicit commercial activity online has manifested into all things mobile. With revenue in the billions from mobile marketing, criminals are doing their best to harness the …
A comparative view of cloud-based DDoS protection services
Six months ago we experienced a 30Gb/sec and 60M PPS attack that was targeting over 1000 IPs on our network. Although we eventually stopped the attack with the aid of our …
Featured news
Resources
Don't miss
- Microsoft May 2026 Patch Tuesday: Many fixes, but no zero-days
- Stealthy hackers exploit cPanel flaw in active backdoor campaign (CVE-2026-41940)
- Amazon Quick authorization bypass let users reach blocked AI chat agents
- Download: The IT and security field guide to AI adoption
- JetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413)