Help Net Security
Actions to strengthen your defense, minimize damage
IT professionals should use the nearly epic scale of the Sony cyber attacks to spur their companies into action versus panicking about potential risks. “The FBI is right …
Cybercrime will continue to evolve
The breadth and depth of the data breaches seen by the world in 2014 was shocking – spanning major banks, e-commerce giants, healthcare giants, casinos and others, …
Week in review: ICANN systems breached, critical Git and SOHO router flaws
Here’s an overview of some of last week’s most interesting news, reviews and articles: The problem with security shortcuts A combination of irresponsible user …
Cybercriminals won’t take a vacation this holiday season
The holiday period is a time to celebrate with family and loved ones. Unfortunately, cybercriminals will use the season to take advantage of businesses as IT staff and end …
Your email, your data, your control
In the U.S., we are willing to trade our privacy and security in exchange for convenience. Think about the last time you stored your password on a website, kept a credit card …
Top 5 social media security predictions for 2015
Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015. Studies in the last year on …
Smart grid security certification in Europe
ENISA issues a report on smart grid security certification in Europe targeted at EU Member States (MS), the Commission, certification bodies and the private sector; with …

Python Forensics
Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a “no-nonsense resource for the rapid development of new …
Only 1% of consumers feel safe using mobile payments
Evaluating online cybersecurity awareness of 2,011 consumers from the U.S. and U.K., a new survey by One Poll and Dimensional Research revealed that more than 40 percent of …
Application Threat and Usage Report 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic …
Tackling the growing web of data residency and privacy regulations
With an increasing number of companies moving to the cloud, we’ve seen a surge in investment by cloud providers to build international datacenters. While these …
Top 5 malware attacks: 35 reused components
CyActive identified the top five malware that returned the highest ROI for hackers with the least effort per dollar — achieved by recycling code and using the same methods …