Help Net Security
DDoS attack volumes plummet as NTP servers got patched
Wise to attackers’ exploitation of the Network Time Protocol (NTP) vulnerability to create distributed reflection denial of service (DrDoS) attacks, information security …
The weak links in an increasingly dynamic threat landscape
The Cisco 2014 Midyear Security Report, released today at Black Hat, examines the “weak links” in organizations – outdated software, bad code, abandoned …
NIST asks for comments on security guide for federal information systems
The National Institute of Standards and Technology (NIST) has issued for public comment a draft update of its primary guide to assessing the security and privacy controls that …
New game sharpens secure coding skills
Today at Black Hat, Checkmarx launched Game of Hacks, a challenging game for software developers and security professionals to test their application hacking skills, improve …
Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight …
Competition to crack a virtual terrorist HDD, break into CCTV systems
Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest …
Reactions to the Paddy Power data breach
Paddy Power is contacting 649,055 customers in relation to a data breach from 2010. The historical dataset contained individual customer’s name, username, address, email …
Top 10 Facebook scams
American singer and actress Taylor Swift has lost her scam mojo, as her fake sex tape spreading on Facebook was excluded from the top ten most successful scams, according to …
Do CISOs deserve a seat at the leadership table?
ThreatTrack Security published a survey study of C-level executives that underscores a hotly-debated topic in executive circles: what is the role of the CISO? “The …
Failure is an option
Information is the lifeblood of today’s business world. With timely and accurate information business decisions can be made quickly and confidently. Thanks to modern …
PCI compliance contributes to false sense of security
Despite industry data to the contrary, a new Tripwire retail cybersecurity survey indicates that organizations that rely on PCI compliance as the core of their information …
PC gamers increasingly under attack
Many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to …
Featured news
Resources
Don't miss
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps