Help Net Security
Wirelessly expand your iPad to 1TB
LaCie announced Fuel: a go-anywhere wireless hard drive for iPad, iPhone and Mac. Without requiring Internet access, the LaCie Fuel adds 1TB of external storage capacity to …
Week in review: Snapchat hack, backdoor in Linksys and Netgear routers, and SD memory card hacking
Here’s an overview of some of last week’s most interesting news, articles and reviews: Researchers demonstrate SD memory card hacking Security researchers Andrew …
Mariposa bot author sentenced to prison
Matjaz Skorjanc, a.k.a. Iserdo, was sentenced to four years and ten months in prison last week by the District Court in Maribor, Slovenia. He was found guilty of manufacturing …
BYOD and biometrics in the enterprise – ally or enemy?
BYOD continues its victory march as the enabler of choice among employees juggling increasingly intertwined home and work lives – for IT managers however it is the stuff …
FireEye acquires Mandiant
FireEye has acquired privately held Mandiant, a provider of advanced endpoint security products and security incident response management solutions. The transaction closed on …
Consumers trust government bodies more than private organizations?
Despite high profile surveillance and data gathering incidents, consumers still appear to trust government bodies more than private sector organisations when it comes to …
Key trends in ransomware, evasion techniques and social attacks
McAfee Labs released a predictions report, analyzing 2013 trends through its Global Threat Intelligence (GTI) service to forecast the threat landscape for the coming year. In …
Four reasons why audits matter
We live in a world where assurance is a precious commodity. People with bad intentions are getting smarter every day as evidenced by the recent compromise of nearly 40 million …
What can we expect next year?
WatchGuard revealed its annual security predictions for 2014. Assembled by WatchGuard’s security research team, the list includes expected advances in ransomware, …
How have consumer attitudes changed towards data security?
Over the last few years, data has become non-exclusive; with the information consumers create and leave behind now the stuff of headlines and documentaries. From swiping a …
Sophisticated and targeted attacks on the horizon
As 2013 draws to a close, Gavin Millard a security expert from Tripwire gazes into his crystal ball and predicts what 2014 has in store for us. Targeted mobile attacks will …
New book on implementing business continuity according to ISO 22301
“Becoming Resilient: The Definitive Guide to ISO 22301 Implementation” describes the process of implementing business continuity according to ISO 22301, an …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations