Microsoft releases BYOD best practices for enterprise workers
Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …
The growing hacking threat to e-commerce websites, part 2
In the first part of my article, I briefly revised attackers’ motivations to compromise your website. In this part, I will discuss how websites get hacked, how you can …
Four reasons why audits matter
We live in a world where assurance is a precious commodity. People with bad intentions are getting smarter every day as evidenced by the recent compromise of nearly 40 million …
What are the building blocks of security culture?
In order to understand how to create security culture, it is important to know what it is and how we define it, so that we can look beyond the basics. Taking into …
Five resolutions to help IT pros get ready for 2014
IT and cybersecurity professionals should resolve now to gear up for accelerated change and complexity in 2014, especially in cybersecurity, data privacy and big data, says …
Teaching children information security skills
In this interview, Julie Peeler, the Director of the (ISC)2 Foundation, discusses the biggest online threats to kids and provides tips on how to teach children to stay safe …
The growing hacking threat to e-commerce websites, part 1
Recently, a friend of mine, owner of a small online web store, had his website compromised. He asked me lots of questions about why this had happen (he didn’t really …
Building an OATH-compliant authentication server for less than $100
Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …
Gamers attacked 11.7 million times in 2013
Just days after the launch of the PlayStation 4 and the Xbox One, Kaspersky Lab experts have discovered that PC gamers across Europe were hit by a massive number of attacks in …
Energy-efficient bcrypt cracking
Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware …
Inadequate electronic disposal protocols can lead to security leaks
American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the …
Using firewall rules to migrate business applications to a private cloud
An increasing number of organizations are already taking advantage or planning to take advantage of the many financial and operational benefits that a private cloud has to …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints