Help Net Security
Identity theft vendor sentenced to 100 months in prison
A northern California man who served as an information and document vendor in the identity theft and credit card fraud ring known as Carder.su was sentenced yesterday to serve …
D-Link releases DWL-8610AP Wi-Fi AP with security features
D-Link announced the DWL-8610AP, a new high power, 802.11ac unified wireless access point. Rich with advanced radio management and security features, it allows IT …
Week in review: Securing networks in the IoT era, and taking control of Android app permissions
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Breaking the security of physical devices In this podcast …
Sneak attack through smartphone shared memory
A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of …
Securing networks in the Internet of Things era
We all know that the Internet of Things (IoT) is coming, and it’s going to change everything. Its sheer scale alone is almost mind-boggling: Gartner reckons that the …
Why you’re not as secure as you think you are
There are 2.4 billion Internet users in the world today. Many of these users, in good faith, leave their personal online security up to their service providers. Sadly, time …
Worldwide infosec spending to grow in 2014
Worldwide spending on information security will reach $71.1 billion in 2014, an increase of 7.9 percent over 2013, with the data loss prevention segment recording the fastest …
51 UPS stores hit with PoS malware
UPS Stores, a subsidiary of UPS, has discovered malware on systems at 51 locations in 24 states (about 1%) of 4,470 franchised center locations throughout the United States. …
What can we learn from the top 10 biggest data breaches?
You can’t blink these days without hearing about yet another data breach. While some may be suffering from “breach fatigue” and becoming jaded, we argue that …
NIST vetting guide helps in testing mobile apps
While many mobile device apps such as a calendar or collaboration tools are very handy and can improve productivity, they can also introduce vulnerabilities that can put …
Crooks trying out new tactics to spread fake AV
Infection numbers of well-established fake AV families have reached the lowest level in years, and Microsoft researchers believe the drop is the result of the antimalware …
Machete cyber espionage campaign targeting Latin America
Kaspersky Lab discovered a new cyber-espionage campaign code-named Machete. This campaign has been targeting high profile victims, including government, military, law …