Please turn on your JavaScript for this page to function normally.
Photo gallery: McAfee FOCUS 14

Help Net Security attended McAfee’s Annual Security Conference FOCUS 14 that has been held this week at The Venetian and the Palazzo Congress Center in Las Vegas. …

Post Snowden, most users have changed Internet habits

On the heels of Edward Snowden’s advice to switch from Dropbox, Facebook and Google to services that place a high priority on security and privacy, F-Secure is releasing …

NIST Guide to Cyber Threat Information Sharing open for comments

NIST has announced the public comment release of Draft Special Publication (SP) 800-150, Guide to Cyber Threat Information Sharing. The purpose of this publication is to …

Over a third of orgs have no real-time insight on cyber risks

Most organizations (67%) are facing rising threats in their information security risk environment, but over a third (37%) have no real-time insight on cyber risks necessary to …

Dynamic endpoint protection by McAfee and ForeScout

ForeScout Technologies and McAfee, part of Intel Security, have partnered to provide a new and enhanced interoperability between ForeScout CounterACT and McAfee solutions. The …

White House network breach was likely nation-sponsored

The White House has confirmed that the unclassified Executive Office of the President network has been breached by unknown hackers. People in the know speculate that the …

Orgs choose network performance over security

An alarming number of organizations are disabling advanced firewall features in order to avoid significant network performance degradation, say the results of the Network …

Fake “Online Ebola Alert Tool” delivers Trojan, unwanted apps

Cyber scammers continue to take advantage of the fear and apprehension surrounding the proliferation of the Ebola virus. While Ebola-themed online hoaxes are nothing new, …

Over one-third of all enterprise data leakage policy violations occur on mobile devices

Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope …

Samsung users could be locked out of their devices by attackers

A zero-day flaw in Samsung’s Find My Mobile system that can be extremely easily exploited to remotely lock a target’s phone has been uncovered by programmer and …

US ICS operators under attack by crims wielding BlackEnergy malware

The US ICS-CERT has issued a warning about an ongoing sophisticated malware campaign that has hit a number of industrial control systems (ICSs) environments using a variant of …

10% of employees unaware if they have an IT department or not

A transatlantic survey of 2000 employees has found that only a fifth of UK workers think their data is more secure at work than at than at home, whereas the majority of US …

Don't miss

Cybersecurity news