Help Net Security
Infosecurity Europe 2014 showcase
Here’s a video overview of Infosecurity Europe 2014, that took place last week in London. For a roundup of news from the conference, including photo galleries, podcasts …
Wi-Fi Smart Plug: Control devices from anywhere
D-Link announced the Wi-Fi Smart Plug (DSP-W215), which allows users to monitor and control their home’s electronic devices from anywhere. Using the free mydlink app for …
Windows flaw allows access to data after accounts are revoked
A disabled account in Windows’ network does not take effect immediately, according to Aorato. In fact, due to design considerations disabled accounts – and the …
Embedding positive security behaviors is essential
Organizations have spent millions over recent decades on information security awareness activities. The rationale behind this approach was to take their biggest asset – …
Cybergangs accelerating velocity of targeted brand development
Cybercrime gangs are accelerating their substitution of targeted brands at an alarming new pace, according to a new APWG report. Of the 681 targets that were phished in 2H …
Convergence of physical and cyber security
The concept of security convergence, where physical and cyber security issues overlap, has been around for more than a decade. But it has only been in the last few years that …
Tips for utilities to comply with new cybersecurity standards
When the North American Electric Reliability Corporation (NERC) signed Order 791 in January 2014, more than 400 utilities suddenly faced a tight timetable to plan for and …
Global cost of data breach goes up by 15 percent
The average consolidated total cost of a data breach increased 15 percent in the last year to $3.5 million, say the results of Ponemon Institute’s ninth annual Cost of …
Mobile phone security transformed with 4 new encryption apps
Following the high profile breaches of mobile phone security that have hit the headlines in recent years, a British company has launched a new range of mobile phone apps that …
NIST updates Transport Layer Security (TLS) guidelines
The National Institute of Standards and Technology (NIST) has released an update to a document that helps computer administrators maintain the security of information …
Week in review: IE 0-day patched, Windows XP gets unexpected update, and tips on how to learn information security
Here’s an overview of some of last week’s most interesting news, reviews and articles: XSS bug in popular Chinese site exploited to launch DDoS attack DDoS …
Red Hat to acquire open source storage systems’ firm Inktank
Red Hat announced that it has signed a definitive agreement to acquire Inktank, a provider of scale-out, open source storage systems. Inktank’s flagship technology, …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)