Help Net Security
Oracle introduces vault for encryption keys, wallet files
Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as …
Photo gallery: A walk through Black Hat’s Business Hall
This gallery from Black Hat features: Qualys, Blue Coat Systems, FireEye, Shape Security, Michael Schrenk, Gigamon, Securonix, ThreatTrack Security.
Free Android app identifies and uninstalls spyware
At Black Hat, SnoopWall announced the release of Privacy App for Android platform mobile devices. Privacy App is based upon the company’s counterveillance technology. It …
Two Gameover Zeus variants targeting Europe and beyond
Bitdefender has identified two Gameover Zeus variants in the wild: one of them generates 1,000 domains per day and the other generates 10,000 per day. The UK is currently the …
Turla cyber-espionage campaign puzzle solved
Turla, also known as Snake or Uroburos is one of the most sophisticated ongoing cyber-espionage campaigns. When the first research on Turla/Snake/Uroburos was published, it …
Prioritizing vulnerabilities to close gaps where it matters
Core Security announced the latest version of the Core Attack Intelligence Platform, which consolidates, prioritizes and validates the overwhelming quantity of vulnerabilities …
Photo gallery: Black Hat USA 2014 Business Hall
The Black Hat conference is underway at the Mandalay Bay in Las Vegas, and the “business” part of the conference is bustling. Featured vendors and people: Qualys, …
SWSIS program awards cybersecurity scholarships to women
Responding to a shortage of cybersecurity professionals across the United States and a dearth of women in the field, Applied Computer Security Associates (ACSA) and the …
Deploying and monitoring honeypots made easy
At the Black Hat conference, LogRhythm released a new analytics suite that monitors honeypots to track would-be attackers, enabling customers to analyze nefarious tactics and …
92% of brands fail email security test
The Online Trust Alliance (OTA), the non-profit with the mission to enhance online trust and empower users, announced the results of its 2014 Email Integrity Audit report, …
State of security: malicious sites, CryptoLocker copycats, email scams
AppRiver released its mid-year Global Security Report, a detailed analysis of web and email-borne threats and malware trends tracked between January and June 2014. During the …
Free service helps CryptoLocker victims get their files back
FireEye and Fox-IT announced DecryptCryptoLocker, a new service assisting victims of the CryptoLocker ransomware. Available immediately for no cost, the service can offer help …