Help Net Security
Reactions to David Cameron’s plan to ban end-to-end encryption
On Tuesday, British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK, and ban applications that use end-to-end encryption. Here …
January’s Patch Tuesday marks the start of a new era
Microsoft’s January 2015 patch Tuesday marks the start of a new era. It seems that Microsoft’s trend towards openness in security has reversed and the company that …
Cyber attacks demonstrated on autonomous ground vehicles
Mission Secure Inc. (MSi), a cyber defense technology and solutions provider, and Perrone Robotics Inc. (PRI), a provider of robotic and autonomous ground vehicle solutions, …
Employees are still the biggest IT threat
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014, yet the primary reason endpoint security risk has become …
GFI adds multi server tools to mail security in MailEssentials 2015
GFI Software released GFI MailEssentials 2015, an evolution of the email security platform that adds major enhancements including scalability and load balancing capabilities …
Cost of breach vs. cost of deployment
In security terms, 2014 read like a who’s who of data breaches. Huge, global companies like Target, eBay and Coca-Cola have succumbed to data loss. Public services like …
Protecting personal data in the consumer product industry
Eight in 10 consumers (80 percent) say they are more likely to buy from consumer products (CP) companies that they believe protect their personal information, yet only 37 …
Don’t look back in anger
At the end of the 2014, as at the end of many years before it, our mailboxes were filled with various vendors’ security predictions for 2015. We saw them also in …
Identity management trends in 2015
A new year is always an excellent time to look ahead. So, there’s not much of a better time than now to look at some of the identity management trends expected for the …
Corel DLL hijacking vulnerability could allow arbitrary command execution
Corel has developed a wide range of products including graphics, photo, video and office software. When a file associated with the Corel software is opened, the directory of …
Do we need regular IT security fire drills?
IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …
Is IT security stifling innovation and collaboration?
Critical company data is at risk in the UK as a result of organizations focusing their IT security policies and resources more on external threats, such as cybercriminals and …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations