Help Net Security
Hackers to attack routers at DEF CON
A competition is scheduled for hackers and computer scientists from around the world to better protect consumers against widespread security vulnerabilities in wireless …
Key Internet of Things privacy and security issues
Independently administered throughout 11 countries, a new Fortinet survey gives a global perspective about the Internet of Things, what security and privacy issues are in …
Spammers increasingly targeting Montreal
AdaptiveMobile released data that shows a marked increase in SMS spam across Canada in the past six months. The higher volume of SMS spam comes on the eve of the July 1st …
Quarter of all UK attacks target web services and applications
A comprehensive analysis of security alerts in 2013 reveals that a quarter of all attacks in the UK were application specific attacks or targeted at web applications. This is …
Improving transaction security for financial institutions
Mobile technology is changing the way we conduct financial transactions. With more and more consumers relying on mobile technology to perform everyday activities, the mobile …
Week in review: GCHQ intercepts Google, Facebook users’ communications, Code Spaces destroyed by extortion hack attack
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here …
Are your third-party vendors leaving the door open to hackers?
By now, every security professional in the world should know the story about Fazio Mechanical Services. The Pennsylvania-based company specializes in heating, air conditioning …
Demand for PaaS on the rise
A new age of Develop Your Own Application (DYOA) to meet ever-changing business requirements is driving demand for rapid application development Platform-as-a-Service (PaaS) …
The future of cloud computing
North Bridge Venture Partners, in conjunction with Gigaom Research and 72 collaborating organizations, today released results for its Future of Cloud Computing survey. This …
Authorization model for home automation
Smartphones promise to play an important role in the management and control of Home Automation (HA) solutions. When things and devices have either no or a constrained user …
Most European businesses face a tech deficit
A tech deficit currently affects 72% of European businesses and leads to a gap between what businesses need to achieve and what their infrastructure can support. When compared …
Sir Tim Berners-Lee to open IP EXPO Europe
In his first address to the core IT community of IP EXPO Europe, Sir Tim will outline his 2050 vision for the web and how businesses will use it for competitive advantage. …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE