Help Net Security
Light Patch Tuesday delivers four bulletins
With only four bulletins, this month’s release is the lightest in recent memory. Markedly missing are any bulletins for Internet Explorer and not a single bulletin is …
Understanding mobile security pressure points and vulnerabilities
41 percent of the government employees who used the assessment tool are putting themselves and their agencies at risk with existing mobile device habits, according to a Mobile …
Top 7 security concerns for 2014
AhnLab announced its “Top 7 Security Concerns for 2014”. Because AhnLab is immersed in the cyber trenches and the cloud, its team is very experienced monitoring …
(ISC)2 Foundation offers $145,000 in information security scholarships
The (ISC)2 Foundation, the non-profit charitable trust that aims to empower students, teachers, and the general public to secure their online life with community cyber …
One in five SMB retailers lacks security fundamentals
Fortinet published new research that shows where SMB retailers stand in regards to compliance regulations, security policies and new technologies that help manage big data and …
Privacy takes center stage
AnchorFree anticipates digital privacy, security and access concerns will escalate in 2014 as the following consumer trends take shape. Shift to private and erasable social …
Privacy advocates announce day of protest against NSA spying
A broad coalition of activist groups, companies, and online platforms will hold a worldwide day of activism in opposition to the NSA’s mass spying regime on February …
CyberRX: First industry-wide healthcare cyber attack exercise
HITRUST will lead an industry-wide effort to conduct exercises to simulate cyber attacks on healthcare organizations, named CyberRX. The results will be used to evaluate the …
Mass-scale cleansing of co-opted computing devices
Cyber criminals are infecting innocent victims’ computing devices with crimeware at an alarming rate and with enormous costs. Technology solutions alone have not worked …
Key security program and budget data for CISOs
Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …
The biggest challenge to IT security is marketing
Most companies today are using social media and online marketing channels to tell their customers and prospects about what they do. From company Twitter accounts, LinkedIn …
An introduction to firmware analysis
This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated