Help Net Security
Techniques used in high-profile data breaches
McAfee Labs released a new report, highlighting the role of the “dark web” malware industry as a key enabler of the high-profile POS attacks and data breaches in …
Week in review: Critical GnuTLS library flaw, and new Android devices sold with pre-installed malware
Here’s an overview of some of last week’s most interesting news, videos, and podcasts: Mt. Gox users targeted with fake promises of lost Bitcoin recovery Bitcoin …
SolarWinds enhances its Network Performance Monitor
SolarWinds announced further enhancements to SolarWinds Network Performance Monitor (NPM) that offer the robust network performance monitoring, alerting and reporting …
Upcoming Patch Tuesday looks small once again
Microsoft’s March Patch Tuesday is again shaping up to be on the lighter side of some months, continuing the 2014 trend of smaller Patch Tuesdays. We only see 2 issues …
European IT pros reveal top reasons to monitor privileged users
BalaBit IT Security announced results of a recent survey of IT security professionals about use of privileged identity management (PIM) and privileged activity monitoring …
New technique targets C code to spot malware attacks
Researchers from North Carolina State University have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on …
Cybersecurity concerns becoming a boardroom issue
The increasing frequency, sophistication, and business impact of cyber-attacks have pushed cybersecurity planning and protection from an operational concern of IT departments …
Major gaps found in the governance of emerging technologies
SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing – and in some instances mandating …
73% of companies are unprepared for disaster recovery
The Disaster Recovery Preparedness (DRP) Council announced findings from its benchmark study which show that 73% of respondent organizations worldwide are not taking adequate …
Four trillion security transactions reveal security highlights
In 2013, CYREN analyzed more than four trillion security transactions worldwide – averaging 10 to 15 billion transactions per day. There’s been a marked increase …
Scammers turn to Facebook for targeting
Scammers are increasingly taking advantage of Facebook targeting tools and user trust to push cheap pharmaceuticals, designer replicas and other products in a trend …
NIST announces security framework… yawn
Let me start out by saying that I have a bias against regulatory compliance standards; especially those that are non-specific, not prescriptive, require voluntary cooperation …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations