Help Net Security
Will 2015 be the year of risk-based security?
As 2014 comes to a close, many of us are beginning to look ahead at the expected trends for the coming year. For those of us in cybersecurity who are at the forefront of …
Actions to strengthen your defense, minimize damage
IT professionals should use the nearly epic scale of the Sony cyber attacks to spur their companies into action versus panicking about potential risks. “The FBI is right …
Cybercrime will continue to evolve
The breadth and depth of the data breaches seen by the world in 2014 was shocking – spanning major banks, e-commerce giants, healthcare giants, casinos and others, …
Week in review: ICANN systems breached, critical Git and SOHO router flaws
Here’s an overview of some of last week’s most interesting news, reviews and articles: The problem with security shortcuts A combination of irresponsible user …
Cybercriminals won’t take a vacation this holiday season
The holiday period is a time to celebrate with family and loved ones. Unfortunately, cybercriminals will use the season to take advantage of businesses as IT staff and end …
Your email, your data, your control
In the U.S., we are willing to trade our privacy and security in exchange for convenience. Think about the last time you stored your password on a website, kept a credit card …
Top 5 social media security predictions for 2015
Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015. Studies in the last year on …
Smart grid security certification in Europe
ENISA issues a report on smart grid security certification in Europe targeted at EU Member States (MS), the Commission, certification bodies and the private sector; with …

Python Forensics
Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a “no-nonsense resource for the rapid development of new …
Only 1% of consumers feel safe using mobile payments
Evaluating online cybersecurity awareness of 2,011 consumers from the U.S. and U.K., a new survey by One Poll and Dimensional Research revealed that more than 40 percent of …
Application Threat and Usage Report 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic …
Tackling the growing web of data residency and privacy regulations
With an increasing number of companies moving to the cloud, we’ve seen a surge in investment by cloud providers to build international datacenters. While these …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations