Help Net Security
Cisco expands wireless LAN portfolio
Wireless networks have become a quintessential component for businesses, providing much more than basic connectivity. With the increasing adoption of 802.11ac, organizations …
Analysis of 244,703 DDoS incidents
NSFOCUS released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report includes statistical analysis and key observations …
Are cybercriminals targeting your tax return?
Iovation is advising businesses and consumers about how to protect data and personal information to avoid identity theft during tax season. As the IRS has made it more …
Infographic: A phishing email’s route through the corporate network
For years, even decades, computer security has been seen as a technical problem that requires a technical solution. In recent years, enterprises have plowed billions of …
Retailers urge adoption of PIN-based credit cards
The National Retail Federation told the Senate that it’s time for an overhaul of the nation’s fraud-prone credit and debit card system, saying banks’ …
Surveillance is driving organizations away from the cloud
A third of IT security professionals do not keep corporate data in the cloud because of fear of government snooping, with the majority of them preferring to store sensitive …
Natural Security Alliance releases specs for strong authentication standard
The Natural Security Alliance has released the newest specifications for its world first strong authentication standard. The standard defines a strong authentication method, …
Network, engage and do business at Infosecurity Europe
Infosecurity Europe is the largest and most attended information security event in Europe. Held in central London, it is a free event featuring over 325 exhibitors presenting …
SCADA risk awareness, threats and breaches
SANS announced results of its 2014 Survey on control system security, in which 268 IT professionals answered questions about their overall risk awareness, trends in threats …
Black markets for hackers are maturing
Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, …
Five tips to reduce identity theft
Some Americans submitting their taxes this year will make the unpleasant discovery that someone else has already filed and stolen their refunds. Tax fraud claimed 1.2 million …
Sogeti social engineering challenge at HITB Haxpo
For the third year in a row Sogeti organizes the social engineering challenge during Hack In The Box Amsterdam. In 2012 and 2013 they asked contestants to show weaknesses in …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations