Help Net Security
Employees take too many risks with Wi-Fi security
UK employees are potentially putting their companies at risk of cyber-attack when using mobile devices for work purposes while on holiday or on a short break, new research has …
Could you maintain security in event of IT failure?
A study investigating the priorities for the UK and Ireland’s top banks and insurance companies has revealed low confidence in the ability to remain secure in the event …
DEF CON contest to help track down illegal robocalls
The Federal Trade Commission is looking to expand the technological arsenal that can be used in the battle against illegal phone spammers by challenging DEF CON 22 attendees …
Financial ransomware now targeting U.S. users
Although the GameOver Zeus botnet and CryptoLocker ransomware have been disrupted, it is still too early for a victory celebration. First, the two week deadline expires on …
600,000 customer details compromised at Domino’s
Today’s news that 600,000 customer records have been stolen from Domino’s France and Belgium yet again raises questions about just how seriously large corporations …
Five great computer security tips that few people follow
If you’re an infosec professional, you probably know a ton of security tips and best practices; use a firewall, update antivirus, patch regularly, adhere to the least …
Service providers need different core competencies in a digital world
Organizations’ emerging transformation to digital business models is driving the need for greater IT agility to meet changing business strategies and requirements in a …
Analysis of 3000 vulnerabilities in SAP
According to official information from SAP portal, more than 3000 vulnerabilities have been closed by SAP. Here are 6 highlights from a research conducted by the ERPScan team …
Week in review: Replicating NSA’s gadgets using open source, World Cup-themed threats, and life after TrueCrypt
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Replicating NSA’s gadgets using open source In this …
One-third of cyber attacks take hours to detect
More than one-third of cyber attacks take hours to detect. Even more alarming, resolving breaches takes days, weeks, and in some cases, even months. Despite increased resource …
The privacy attitudes of 15,000 consumers from 15 countries
Spanning 15 countries and 15,000 consumers, the the EMC Privacy Index reveals consumers hold viewpoints on privacy that vary widely by geography and the type of activity …
What’s the leading cause of data loss?
HDD crashes more than doubled in the last four years, prevailing as the most common cause of data loss according to customer data provided by Kroll Ontrack. When asked about …
Featured news
Resources
Don't miss
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management
- Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel