Help Net Security
Inadequate electronic disposal protocols can lead to security leaks
American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the …
Using firewall rules to migrate business applications to a private cloud
An increasing number of organizations are already taking advantage or planning to take advantage of the many financial and operational benefits that a private cloud has to …
The iCloud keychain and iOS 7 data protection
When Apple announced iOS 7, iCloud Keychain was one of its key features. It is no doubt great for usability, but what about security? What kind of access does Apple have to …
Popular holiday-themed phishing attacks
The holidays are a busy time for everyone-¦ especially for hackers trying to phish your employees. Phishing is most effective when it exploits human emotions—fear, greed, …
What threats will dominate 2014?
Trend Micro released its annual security predictions report. The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and …
The DDoS debate: Multi-layered versus single solution
There is a DDoS debate in the cybersecurity industry about which solution is more effective – multi-layer or single. However, the argument is really more complex and …
Tech giants call for government surveillance reform
Eight Internet giants have formally urged the US president and Congress to reform and limit government surveillance, and have offered several suggestions on how to do it. AOL, …
1Password 4.1 for Mac adds new password updating, better search
Popular password manager 1Password for Mac reached version 4.1 that comes with some long-requested features, the most notable being a new Login (password) updating process. If …
Cybercrime ignorance is a serious risk
Organizations who fail to recognize the threat posed by cyber crime are putting the livelihoods of stakeholders and customers at serious risk, and those organizations that …
13 Anonymous hackers plead guilty to PayPal DDoS attack
Thirteen defendants pleaded guilty in federal court in San Jose on Friday to charges related to their involvement in the cyber-attack of PayPal’s website as part of the …
Cloud security in 2014: Automation and consolidation
Eric Chiu, president and co-founder of HyTrust, predicts that in 2014: 1. Organizations will discover the importance of BYOS for public cloud. Given the recent disclosures …
ENISA issues recommendations on SCADA patching
“How long can we afford having critical infrastructures that use unpatched SCADA systems?” the EU’s cyber security Agency ENISA asks, and advises EU Member …
Featured news
Resources
Don't miss
- Securing agentic AI systems before they go rogue
- EU launches EU-based, privacy-focused DNS resolution service
- Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)
- Balancing cybersecurity and client experience for high-net-worth clients
- CISOs, are you ready for cyber threats in biotech?