Help Net Security
Panic! No malware required!
The landscape has shifted. Security is no longer something your organization can have complete control over. In this video, John Strand will demonstrate how most large …
New Linksys dual-band Wireless-AC Access Points released
Linksys expanded its business networking line-up with two new 802.11ac access points which allow network administrators, resellers and businesses to deploy a high-speed …
CIOs are moving more information into the cloud
Despite continued concerns about security, CIOs and other senior-level IT leaders are moving an increasing percentage of their organizational information into the cloud and …
Tips for improving your cyber security
With cyber threats around the globe evolving and becoming more sophisticated, evidenced by the recent data breach at retailer Target, it is important that consumers protect …
European Cybercrime Centre warns about Windows XP security risks
The European Cybercrime Centre (EC3) at Europol warns about security risks related to the end of Windows XP support. After 8 April 2014, Windows will stop supporting its …
Cost of Advanced Evasion Techniques in recent data breaches
A new report by McAfee examines the controversy and confusion surrounding Advanced Evasion Techniques (AETs), and the role that they play in Advanced Persistent Threats …
Simple steps to prevent data theft
HID Global offered four tips for protecting organizations against the types of data breaches that recently occurred at major retailers. An effective defense against the …
Week in review: Banks sue Target and Trustwave, Basecamp DDoS, Fyodor restarts the Full Disclosure list
Here’s an overview of some of last week’s most interesting news, reviews and articles: Flaws in Android update mechanism could turn apps into malware A group of …
Having a backup solution doesn’t prevent data loss
Results from a survey of customers who lost valuable computer data shows the majority of consumers and businesses are taking steps to back up their data, but a range of minor …
Challenges of running cloud-hosted applications
CloudEndure revealed the results of an industry-first benchmark survey, presenting best practices and success metrics reported by companies that host web applications in the …
Analysis of three billion attacks reveals SQL injections cost $196,000
NTT Innovation Institute has announced the release of its Global Threat Intelligence Report (GTIR), which raises awareness with C-level executives and security professionals …
Does business understand IT security?
The role of IT security is still not well-understood by business, according to a new survey by Turnkey Consulting. The survey asked IT professionals about their …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations