Help Net Security
Reactions to President Obama’s 2015 State of the Union Address
President Obama’s State of the Union Address featured a new legislative focus on cyber security issues: No foreign nation, no hacker, should be able to shut down our …
Microsoft releases Sysmon 2.0
Sysmon is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows …
11% of Android banking and finance apps are dangerous
RiskIQ found that more than 40,000 of the 350,000 apps which reference banking in the world’s top 90 app stores contain malware or suspicious binaries. Meanwhile, of …
Global shortage of skilled cybersecurity pros
A new global survey of more than 3,400 ISACA members shows that 46 percent of respondents expect their organization to face a cyberattack in 2015 and 83 percent believe …
Bold reform needed to strengthen U.S cybersecurity
Mr. President, the status quo in cybersecurity is failing the U.S. It is failing the commercial sector, which is being publicly breached on a weekly basis, and it is failing …
Cybersecurity readiness: Widening gulf between perception and reality
Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco. Defenders, namely, …
SQL injection vulnerabilities surge to highest levels in three years
UPDATE: Tuesday, 20 January 2015, 1:10 PT – Jericho from Attrition.org has written an insightful post that essentially debunks the data released by DB Networks. …
Biometric authentication app downloads to reach 770 million by 2019
More than 770 million biometric authentication applications will be downloaded per annum by 2019, up from just 6 million this year. This will reduce dependence on alphanumeric …
Has the time come to give up penetration testing?
By carrying out “white hat’ attacks to identify potential entry points in the externally facing parts of an organization’s IT network, such as its firewalls, …
Guide on actionable information for security incident response
ENISA publishes a good practice guide on Actionable Information for Security Incident Response, aiming to provide a picture of the challenges national CERTs and other security …
The rise of mercenary hacker crews offering Espionage-as-a-Service
Although the Sony attack was loud, damaging and hugely embarrassing to the company, the bigger threat is from mercenary hacker crews who steal billions of dollars of valuable …
The cost of malware containment
Enterprises spend $1.3 million a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time. The Ponemon Institute surveyed more …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)