Help Net Security
Companies must improve incident response plans
Security threats are imminent, but CEOs and other members of the management team are in the dark about potential cyber-attacks against their companies, say the results of a …
Financial sector needs non-replicable, single-use credentials
Different tokens, devices, mobile phones, e-signatures, etc. are used to authenticate our e-identities. Yet, some financial institutions are still not considering the risk of …
Cybersecurity predictions for 2014
The advent of new technologies, the widespread implementation of mobile and wireless communication and the increase in mobile adoption will open up new opportunities for …
“123456” unseats “password” from top of worst passwords list
SplashData has announced its annual list of the 25 most common passwords found on the Internet, and for the first time since the company began compiling its annual list, …
Week in review: Target POS malware, Bitcoin insurance, and the future of net neutrality
Here’s an overview of some of last week’s most interesting news, videos and articles: The biggest challenge to IT security is marketing Most companies today are …
Silk Road forfeits $28 million in Bitcoins
Preet Bharara, the United States Attorney for the Southern District of New York, announced the forfeiture of approximately 29,655 Bitcoins (which, at today’s Bitcoin …
Major developments that will drive Big Data in 2014
Companies are compelled to uncover real value in their data, and they’re turning to Hadoop as a key part of their data center strategy. In 2014, data centers will move …
How to implement incident reporting in cloud computing
Cloud security incidents often catch the media’s attention as they affect large number of users. For example, recently a large storage service provider suffered an …
New technology searches encrypted data in its encrypted form
Fujitsu Laboratories announced the development of a technology that can perform concealed searches of encrypted data in its encrypted form. Searching data while it is …
Explosive growth of advanced attacks and malicious traffic
The Cisco 2014 Annual Security Report, released today, reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks …
Quantum physics could make secure, single-use computer memories possible
Computer security systems may one day get a boost from quantum physics, as a result of recent research from the National Institute of Standards and Technology (NIST). Computer …
Blackphone to put privacy and control first
Silent Circle and Geeksphone announced Blackphone, a smartphone placing privacy and control directly in the hands of its users. Blackphone, powered by a security-oriented …
Featured news
Resources
Don't miss
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted
- Identifying high-risk APIs across thousands of code repositories
- Want fewer security fires to fight? Start with threat modeling