Mirko Zorz
Android security from the ground up
Georgia Weidman is a penetration tester, security researcher, and trainer. She’s also one of the speakers at the upcoming HITBSecConf 2012 Amsterdam conference. In this …
Hardening the endpoint operating system
Qualys CTO Wolfgang Kandek, talks about the effects of hardening the endpoint operating system and improving the resilience against common attacks. As the CTO for Qualys, …
VolP: The new way in?
Voice is now data and as such it is a new attack vector for hackers into a company network. Most VoIP systems being deployed are based on Session Initiation Protocol (or SIP) …
The evolution of malware and the threat landscape
The past 10 years represent a very interesting timeframe for reviewing vulnerability disclosures and ensuing changes that continue to affect risk management in IT …
Video: RSA Conference 2012 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2012. Here’s a closer look at the show. For …
The future of attacks on banking systems
If you’re a regular reader of our news site – or, indeed, any other that site that deals with information and computer security – you might sometimes get the …
Video: Trustworthy Internet Movement Initiative
During his keynote at RSA Conference 2012, Philippe Courtot, Chairman and CEO at Qualys, addressed issues facing the entire information security industry. Courtot also …
Wireless security and the enterprise
Jesse Frankel is the head of the AirMagnet Intrusion Research Team. He has been working in various areas of wireless LAN technology and applications for more than 15 years. …
VeriSign hack: Reactions from the security community
VeriSign admitted it was hacked in 2010 and cannot identify what data was stolen. Below are comments on the situation that Help Net Security received from industry veterans. …
Keeping on top of financial malware
A lot of people are apprehensive about buying things and accessing their bank accounts online. It is an understandable fear, especially when one is aware that it takes just a …
Questioning of incoming data crucial for security awareness
In the last six-to-twelve months, we have witnessed many different cyber attacks. Hacktivists were making a statement, the players behind the so-called Advanced Persistent …
Reactions from the security community to the Trustworthy Computing Initiative
This week, Microsoft is celebrating 10 years of its Trustworthy Computing Initiative (TwC). One of the most well-known outcomes of Trustworthy Computing is the Microsoft …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground