Please turn on your JavaScript for this page to function normally.
Wireless security and the enterprise

Jesse Frankel is the head of the AirMagnet Intrusion Research Team. He has been working in various areas of wireless LAN technology and applications for more than 15 years. …

VeriSign hack: Reactions from the security community

VeriSign admitted it was hacked in 2010 and cannot identify what data was stolen. Below are comments on the situation that Help Net Security received from industry veterans. …

Keeping on top of financial malware

A lot of people are apprehensive about buying things and accessing their bank accounts online. It is an understandable fear, especially when one is aware that it takes just a …

Questioning of incoming data crucial for security awareness

In the last six-to-twelve months, we have witnessed many different cyber attacks. Hacktivists were making a statement, the players behind the so-called Advanced Persistent …

Reactions from the security community to the Trustworthy Computing Initiative

This week, Microsoft is celebrating 10 years of its Trustworthy Computing Initiative (TwC). One of the most well-known outcomes of Trustworthy Computing is the Microsoft …

How to foil targeted attacks

There are two types of targeted attacks aimed at organizations and companies: server-side and client-side. Server-side attacks consist of attacks on the organizations’ …

Mobile application security risks

Security experts have already agreed on the fact that the increased use of personal mobile devices and smartphones for work purposes is one of the biggest threat to the …

A new perspective on the insider threat

When talking about the insider threat, the first that comes to mind to many (if not all) information security professionals is the threat posed by rogue insiders that …

A study of hacker forums

Recently Imperva released a report analyzing the content and activities of an online hacker forum with nearly 220,000 registered members. In this podcast, Rob Rachwald, the …

Microsoft puts vulnerability exploitation into context

Recently Microsoft released the 11th volume of the Microsoft Security Intelligence Report, the most comprehensive version of this report to date. In this podcast, Tim Rains, …

Testing web applications for security flaws

David Hoelzer is the Director of Research, Enclave Forensics and a SANS Trainer. In this interview he discusses web application testing, offers advice for those on the hunt …

SANS London 2011 training

Andrew Smith is the Managing Director, EMEA, for the SANS Institute. In this interview he discusses the SANS London 2011 training event and offers insight into what exactly …

Don't miss

Cybersecurity news