Help Net Security
IoT security and privacy best practices
In a report on the Internet of Things (IoT), the staff of the Federal Trade Commission recommend a series of concrete steps that businesses can take to enhance and protect …
High severity vulnerability found in Linux GNU C library
The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …
Supposedly clean Office documents download malware
Bitdefender is warning Microsoft Office users against the emergence of a new spam campaign that is looking to trick antispam filters in order to allow spam to pass freely into …
Android Wi-Fi Direct DoS vulnerability discovered
Some Android devices are affected by a Denial of Service attack when scanning for WiFi Direct devices, according to Andres Blanco from the CoreLabs Team. An attacker could …
The impact of new EU security legislation
Based on a survey of organizations from the UK, France and Germany, FireEye found that many organizations in Europe are unprepared for and challenged by cost and complexity of …
Employees would sell passwords for $150
SailPoint uncovered a widespread level of employee indifference towards protecting sensitive corporate data, including personal information of customers. In fact, an alarming …
Video: Bruce Schneier talks to Edward Snowden
As part of a Harvard computer science symposium, Bruce Schneier had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography to …
How the Internet of Things impacts enterprise security
A new study conducted by Atomik Research examined the impact that emerging security threats connected with the Internet of Things (IoT) have on enterprise security. Study …
Open source software for quantum information
NIST has partnered with the private sector to develop the next-generation open source control software for quantum information systems. NIST is a world leader in quantum …
APTs: Minimizing losses with early detection
Let’s travel back to 2006, the year the blockbuster, “The Departed,” came out. Matt Damon plays a young criminal who has infiltrated the state police as an …
Week in review: HealthCare.gov leaks user data, Angler kit exploits Flash 0-day, researchers recreate NSA’s spying tools on the cheap
Here’s an overview of some of last week’s most interesting news, interviews and articles: Has the time come to give up penetration testing? The more miles of …
Why leaving a shared device unprotected is dangerous
According to a survey jointly executed by B2B International and Kaspersky Lab, 32 per cent of respondents who share an Internet-enabled device with their relatives, colleagues …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does