Help Net Security
IEEE launches Anti-Malware Support Service
IEEE announced the launch of IEEE Anti-Malware Support Service (AMSS). A new service from IEEE Standards Association’s (IEEE-SA) Industry Connections Security Group …
Number and diversity of phishing targets continues to increase
The number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter, the Anti-Phishing Working Group reports. 2013 was one of the heaviest …
How to build trust between business and IT
One of the biggest challenges we face with securing our networks and systems is that many businesses view cyber security as an IT problem and not a business problem. However, …
DDoS attacks are becoming more effective
Disruptive cyber-attacks are becoming more effective at breaching security defenses, causing major disruption and sometimes bringing down organizations for whole working days, …
5 essential mobile security tips
It doesn’t matter if you’re using iOS, Android, Windows Phone or BlackBerry, these tips apply to every mobile device that connects to the Internet. “How …
The impact of IoT on IT infrastructure
Enterprises say they are prepared for the Internet of Things (IoT) and see it as a potential opportunity. However, as it stands today, there may not be enough network capacity …
State of the Internet: Trends impacting online business
Akamai Technologies provides insight into key global statistics such as connection speeds, overall attack traffic, network connectivity/availability issues, and traffic …
Week in review: “Lawful interception” mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 42 released (IN)SECURE Magazine is a free …
The unlocked backdoor to healthcare data
The majority of healthcare vendors lack minimum security, which is illuminated by the fact that more than 58% scoring in the “D” grade range for their culture of …
How old are today’s networks?
The percentage of aging and obsolete devices in today’s corporate networks around the globe is at its highest in six years, signaling that the global financial crisis of …
Business risk: Tales from the TrueCrypt
The recent incidents with the Heartbleed OpenSSL vulnerability, along with the strange turn of events involving TrueCrypt shine a light on a big issue for security …
Data breaches in 2013 exposed 14% of all debit cards
Financial institutions weathered the Target data breach and are looking for solutions to enhance security, with many issuers now planning to implement EMV debit, according to …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE