Help Net Security
The cost of malware containment
Enterprises spend $1.3 million a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time. The Ponemon Institute surveyed more …
Week in review: Google discloses Windows flaw, French sites under attack, Android users in danger
Here’s an overview of some of last week’s most interesting news and articles: LizardSquad’s DDoS service is powered by hacked home routers The preponderance …
Man arrested for Playstation and Xbox attacks
Officers from the South East Regional Organised Crime Unit (SEROCU) Cyber Crime Unit, supported by Titan ROCU (North West Regional Organised Crime Unit), have arrested a man …
How to prepare if you’re selected for an OCR audit
The forthcoming Office of Civil Rights (OCR) audits for HIPAA compliance have seen some delays this fall – but that doesn’t mean covered organizations can delay …
Hottest Snapchats scam spreads on Facebook
A spam campaign revealing the 10 Hottest Snapchats is a new entry to the long list of Facebook scams flooding the social network. Bitdefender’s Labs have now blacklisted …
WhatsApp sees increasing complexity of spam campaigns
Over the past few months, AdaptiveMobile has tracked an increase of spam complexity on messaging apps, such as WhatsApp, in the United States, Europe and India, and expects …
What is the value of professional certification?
Recognition for and therefore the value of professional certification is rising within the information security domain. In an increasing number of markets across Europe, …
Five key security, identity and access management trends
CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organizations and security professionals in 2015 as they …
Unlock your digital world with True Key
Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …
Reactions to David Cameron’s plan to ban end-to-end encryption
On Tuesday, British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK, and ban applications that use end-to-end encryption. Here …
January’s Patch Tuesday marks the start of a new era
Microsoft’s January 2015 patch Tuesday marks the start of a new era. It seems that Microsoft’s trend towards openness in security has reversed and the company that …
Cyber attacks demonstrated on autonomous ground vehicles
Mission Secure Inc. (MSi), a cyber defense technology and solutions provider, and Perrone Robotics Inc. (PRI), a provider of robotic and autonomous ground vehicle solutions, …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades