Help Net Security
Corporate data: Protected asset or a ticking time bomb?
Despite a growing number of data breaches occurring under the glare of the public spotlight, 71 percent of employees in a new survey report that they have access to data they …
Cyber attacks now longer than ever
Cyber attacks have reached a tipping point in terms of quantity, length, complexity and targets. As cyber threats are growing and expanding to new targets, 52% of respondents …
Microsoft released seven advisories, three are critical
December’s Patch Tuesday brings us seven advisories, three of which are listed as Critical. Depending on how you want to count it, we see a total of 24 or 25 CVEs …
Inside the minds of senior security leaders
More than 80 percent of security leaders believe the challenge posed by external threats is on the rise, while 60 percent also agree their organizations are outgunned in the …
Cost of cybersecurity and risk management to double
“As 2014 ends, it’s clear this was the year everything changed in the world of information security,” said Rick Dakin, Coalfire’s CEO and chief …
Trends in Internet trust exploits, IoT, cyber espionage and privacy
In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the …
Home Wi-Fi security is as bad as PC security in the 90s
Nearly three out of four internet-connected households in the UK are at risk of getting attacked through their wireless router, according to a recent study by Avast Software. …
POODLE attack now targeting TLS
There’s a new SSL/TLS problem being announced today and it’s likely to affect some of the most popular web sites in the world, owning largely to the popularity of …
Negotiating privacy in the age of Big Data
The promise of the Big Data revolution is all around us – improving our quality of life and providing us with new insights in culture, science, economics, and …
(IN)SECURE Magazine issue 44 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 44 has been released today. Table of contents: The …
Software security in a market for lemons
There is little doubt that it’s difficult to develop secure software. First, you need to be aware of the need for security, accepting it as an important element of …
The rise of IoT 2.0 and the battle for the connected home
Sansa Security revealed the company’s Internet of Things (IoT) predictions for 2015, highlighting six of the top trends to watch out for next year. 1. The rise of IoT …
Featured news
Resources
Don't miss
- Hanko: Open-source authentication and user management
- Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)