Help Net Security
February spam highlights
Kaspersky Lab found that many malicious attachments in February’s spam came in emails allegedly sent by women who wanted to make new friends in the run-up to …
Week in review: NSA records a country’s phone calls, SSL innovations, and (IN)SECURE Magazine special issue
Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos, interviews, and articles: US announces transition of oversight over …
IBM launches new software and consulting services
IBM introduced new software and services to help organizations use Big Data and Analytics to address the $3.5 trillion lost each year to fraud and financial crimes. Through …
Webcast: Beware of the Wild Wild Web
The World Wide Web is wasteland brimming with uncontrolled threats and dangers to IT security. Network and IT managers can prevent those threats from causing damage by …
Risks and opportunities of personal data, privacy, and trust
The increased number of stories on data breaches in the news today has many implications, for consumers it’s an increased risk of financial loss, identity theft and …
Product pitch: DigiCert Certificate Inspector
SSL Certificates serve as the security backbone of the internet, securing billions of interactions annually. Yet, too often, system administrators fail to properly configure …
Operation dismantles child exploitation enterprise on Tor network
DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …
Full Disclosure mailing list closure elicits mixed reactions
The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its …
Edward Snowden: Here’s how we take back the Internet
Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but …
The Internet of Things will transform the data center
The Internet of Things (IoT) has a potential transformational effect on the data center market, its customers, technology providers, technologies, and sales and marketing …
20% of all malware ever created appeared in 2013
According to the latest PandaLabs report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever …
91% of video surveillance deployments involve IT departments
ESG research found that among organizations currently using video surveillance technology, 91% indicate that IT manages or supports these deployments. Of the final survey pool …