Help Net Security
Password security is not just a user problem
When high profile password compromises occur, we often spend a lot of time focusing on advice to the users – “Use strong passwords;” “Don’t reuse …
People will do anything for free Wi-Fi
A new Wi-Fi investigation conducted on the streets of London shows that consumers carelessly use public Wi-Fi without regard for their personal privacy. In the experiment, …
Exploring today’s top security concerns
Security related topics are often front and center in the 24-hour news cycle, but what concerns Americans the most? According to a new national survey from University of …
Security policy management in hybrid cloud environments
A new survey by AlgoSec found that 79 percent of organizations need better visibility in order to unify security policy management across their on-premise and public cloud …
The Crime-as-a-Service business model
A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. This …
Seagate Surveillance HDD features recovery services
Seagate released a dedicated surveillance HDD featuring Seagate Rescue services. Engineered specifically for surveillance and video analytics applications, the Surveillance …
CloudFlare offers free SSL encryption
Web performance and security company CloudFlare today launched Universal SSL, making Secure Socket Layer (SSL) encryption available to anyone at no cost. “Yesterday …
Education is the key to increasing mobile security
The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …
Trust in the cloud is at an all-time low
Data security and trust in cloud-based services are a rapidly growing concern for IT decision makers within large organizations, according to a new global study from BT. While …
Week in review: Bash Shellshock bug, jQuery.com compromise, and a replacement for TrueCrypt
Here’s an overview of some of last week’s most interesting news and articles: Behavioral analysis and information security In this interview, Kevin Watkins, Chief …
Malvertising attack techniques dissected
At Virus Bulletin 2014, Bromium presented a research report that highlights the severe risk of malicious ad networks infecting end users. This research provides a real-world …
Making one organization’s incident everyone’s defense
The Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The …
Featured news
Resources
Don't miss
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management