Help Net Security
Global action targeting Shylock malware
On 8 and 9 July 2014, an alliance of law enforcement and industry undertook measures against the Internet domains and servers that form the core of an advanced cybercriminal …
US DOJ provides update on Gameover Zeus and Cryptolocker disruption
The US Justice Department filed a status report with the United States District Court for the Western District of Pennsylvania updating the court on the progress in disrupting …
Raspberry Pi B+ adds connectivity and power features
Launched today, the new Raspberry Pi B+ board, which marks the first significant change to the credit card-sized computer, is available immediately. Priced at $35, the new …
Week in review: Google catches India with fake certificates, and the risks of selling used smartphones
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam …
IoT privacy tech working group announced
TRUSTe formed a multi-stakeholder IoT Privacy Tech Working Group to identify the technical standards and best practices necessary to help enhance consumer privacy in the …
CryptoLocker is temporarily disabled, users still at risk
Bitdefender warns that while CyptoLocker is currently disabled, it could come back to life at any moment. As such, users need to take precautions to protect against this …
Securing the virtual environment
So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical databases, CRM systems, ERP …
Empowered Millennials expect BYOD
New data finds that Millennials—the new generation of workers born between the early 1980s and the early 2000s—are highly dedicated to their jobs and often times work well …
Businesses are deprioritizing information security
Businesses are deprioritizing information security and decreasing their investment in the destruction of confidential information, according to Shred-it. According to the …
Exploring the BYOD security dynamic
Webroot examined the use and security of personal mobile devices in the work environment from both the employee and employer perspectives. The initial survey, conducted in …
Consumers don’t trust any industry with their personal data
U.S. consumers have little faith that companies are able to keep their person data safe. The sentiment crosses nearly all industries with consumers saying that the lack of …
Nearly 70% of critical infrastructure providers suffered a breach
New research from Unisys finds alarming gaps in the security of the world’s critical infrastructure. Nearly 70 percent of companies surveyed that are responsible for the …
Featured news
Resources
Don't miss
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps