Help Net Security
Invasive Selfmite SMS worm uncovered
AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite. It spreads via SMS and fools users into installing a worm app which propagates by …
1.3M personal records exposed in Montana data breach
1.3 million people will be notified that hackers gained entry to a State of Montana’s Department of Public Health and Human Services (DPHHS) computer server, state …
Banking fraud campaign steals 500k euros in a week
The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the …
Companies are afraid of the cloud
Although using cloud solutions can boost company efficiency, not every business has made the jump to cloud services. In a recent F-Secure survey of companies with up to 500 …
(IN)SECURE Magazine issue 42 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 42 has been released today. Table of contents: Six …
Top 10 technologies for information security in 2014
Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterprises are dedicating increasing …
Are CISOs too confident?
CISOs and IT managers may be too confident in their capabilities to ensure their organizations security and defenses against a data breach, according to Courion. A majority …
Symantec addresses global workforce gap in cybersecurity
Symantec launched a first-of-its-kind program, the Symantec Cyber Career Connection (SC3), to address the global workforce gap in cybersecurity and provide new career …
Mobile security and incident readiness
AccessData and Gigaom Research released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that …
Who is ultimately responsible for data security in the cloud?
A recent report following Infosecurity Europe 2014 suggested that 43 per cent of organisations had no enterprise visibility or control into whether employees were putting …
Cybercriminals exploit trusted app and service vulnerabilities
The manipulation of legitimate mobile apps and services played a key role in the expansion of mobile malware at the beginning of 2014. McAfee Labs found that 79 percent of …
Card fraud impacts 1 in 4 consumers worldwide
A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years. The study, …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE