Help Net Security
As confidence sinks, cyber attacks rise
While IT security spending is increasing, confidence is falling. In surveying more than 800 security decision makers and practitioners, the CyberEdge Group found that more …
False positive free online web application security scanner from Netsparker
Netsparker launched their new enterprise online service offering Netsparker Cloud, which enables organizations to simultaneously scan hundreds and thousands of websites for …
When it comes to patient data privacy, compliance and security differ
If a name perfectly underscored a growing issue of concern, it’s Anthem. In February, the health insurance plan provider disclosed cyber attackers had breached its IT …
Transport for London adopts ultra-secure USB drives
Transport for London (TfL) has adopted ultra-secure USB flash drives to ensure that its data is protected in the event of the loss or theft of portable devices. DatAshur USB …
Protecting healthcare records from cyber attacks is a game of cat and mouse
The never-ending battle between healthcare organisations and cyber attackers has always been like a game of cat and mouse. The hacker plays the role of the mouse, constantly …
Cloud security and adoption trends
CloudPassage issued a survey to more than 250,000 members of LinkedIn’s Information Security Group and represents a broad cross section of company sizes, cloud adoption …
Microsoft patches Windows, IE, Office, SharePoint
This month Microsoft has released 14 new bulletins, 5 of which are rated as Critical, 9 as Important. As a déjà vu from last month, a critical remote code execution …
Smartwatches and corporate data
I was super excited when my wife got me a smartwatch. In addition to the geeky coolness factor of a smartwatch, being a long-time security professional I was also interested …
Hacking Nest Thermostat
TrapX confirmed the design flaws discovered in the Nest Learning Thermostat. They validated the attack vector presented at the Black Hat 2014 conference by compromising the …
Hack yourself first: How we can take the fight to the black hats
The Internet has increased the interconnectivity of everyone and everything on the globe. From healthcare to commerce, public services and beyond, being connected has enriched …
Three indicted for breaching Email Service Providers, monetizing stolen data
Viet Quoc Nguyen and Giang Hoang Vu, both citizens of Vietnam who resided for a period of time in the Netherlands, have been indicted on Friday for their role in a massive …
Data classification ranks in top 3 security controls
Bloor Research surveyed 200 senior IT security executives in the UK and the US, all with organizations that have more than 1,000 employees. More than half (54%) of …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does