Help Net Security
CIOs should make digital business tech an IT responsibility
CIOs need to decide how they will position their IT organization in relation to emerging digital business technologies, such as the Internet of Things, 3D printing, wearable …
NIST releases report on cryptography expertise
NIST’s primary external advisory board released a report calling for the agency to increase its staff of cryptography experts and implement more explicit processes for …
Amazon-hosted malware triples in 6 months
Solutionary analyzed the threat landscape and identified the top 10 global ISPs and hosting providers that hosted malware out of more than 21,000 ISPs. Amazon remained the top …
Global action targeting Shylock malware
On 8 and 9 July 2014, an alliance of law enforcement and industry undertook measures against the Internet domains and servers that form the core of an advanced cybercriminal …
DoJ provides update on Gameover Zeus and Cryptolocker disruption
The Justice Department filed a status report with the United States District Court for the Western District of Pennsylvania updating the court on the progress in disrupting …
Raspberry Pi B+ adds connectivity and power features
Launched today, the new Raspberry Pi B+ board, which marks the first significant change to the credit card-sized computer, is available immediately. Priced at $35, the new …
Week in review: Google catches India with fake certificates, and the risks of selling used smartphones
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam …
IoT privacy tech working group announced
TRUSTe formed a multi-stakeholder IoT Privacy Tech Working Group to identify the technical standards and best practices necessary to help enhance consumer privacy in the …
CryptoLocker is temporarily disabled, users still at risk
Bitdefender warns that while CyptoLocker is currently disabled, it could come back to life at any moment. As such, users need to take precautions to protect against this …
Securing the virtual environment
So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical databases, CRM systems, ERP …
Empowered Millennials expect BYOD
New data finds that Millennials—the new generation of workers born between the early 1980s and the early 2000s—are highly dedicated to their jobs and often times work well …
Businesses are deprioritizing information security
Businesses are deprioritizing information security and decreasing their investment in the destruction of confidential information, according to Shred-it. According to the …