Help Net Security
Key focus areas for security technology investment
A new report from the Security for Business Innovation Council advocates three key areas for technology investment and recommendations for specific security technologies to …
Discover what is happening across your IT infrastructure
Netwrix released Netwrix Auditor 6.0, which now delivers visibility into what is happening across the entire IT infrastructure. It provides the broadest available coverage of …
Google account passwords stolen in phishing attack
Hackers have been stealing Google account passwords in a new and better crafted phishing attack that is hard to catch with traditional heuristic detection, according to …
What keeps senior IT security pros up at night? It’s not what you think
In the security space, last year was one for the books. Edward Snowden made waves after leaking classified documents detailing government surveillance programs, which raised …
Penetration testing device that fits in your pocket
Pwnie Express updated the Pwn Phone, a phone that doubles as a powerful penetration testing device making it easy to evaluate wired, wireless and Bluetooth networks. Pwn …
GE acquires Wurldtech to advance cyber security for key industries
GE announced a definitive agreement to acquire privately held Wurldtech, a Vancouver, British Columbia-based company. This move is one of several by GE to help protect …
Week in review: Android locker ransomware, password management done right, IE 0-day exploit details
Here’s an overview of some of last week’s most interesting news, podcasts, interviews, videos and articles: Researchers debunk severity of OAuth “Covert …
Snapchat promises of disappearing messages were false
Snapchat, the developer of a popular mobile messaging app, has agreed to settle Federal Trade Commission charges that it deceived consumers with promises about the …
Microsoft to release eight bulletins on Tuesday
Tuesday, May 13 marks the next Microsoft security patch release. This release will contain eight bulletins, which is the most in a single release so far this year. The good …
Epidemic of unknown malware on enterprise networks
Check Point has issued a report uncovering the major security events that occurred and impacted organizations across the world in 2013. The report is based on analysis of …
Key trends in cloud usage, risks and malware
Skyhigh Networks released the third edition of its quarterly Cloud Adoption and Risk Report. “With this report, we uncovered trends beyond the presence of shadow IT in …
Are rogue employees the biggest threat to information security?
Rogue employees continue to be the biggest threat to information security, according to 37% of IT professionals polled by BSI at Infosecurity Europe 2014. The poll …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online