Help Net Security
New technology searches encrypted data in its encrypted form
Fujitsu Laboratories announced the development of a technology that can perform concealed searches of encrypted data in its encrypted form. Searching data while it is …
Explosive growth of advanced attacks and malicious traffic
The Cisco 2014 Annual Security Report, released today, reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks …
Quantum physics could make secure, single-use computer memories possible
Computer security systems may one day get a boost from quantum physics, as a result of recent research from the National Institute of Standards and Technology (NIST). Computer …
Blackphone to put privacy and control first
Silent Circle and Geeksphone announced Blackphone, a smartphone placing privacy and control directly in the hands of its users. Blackphone, powered by a security-oriented …
Amazon and GoDaddy are the biggest malware hosters
The United States is the leading malware hosting nation, with 44 percent of all malware hosted domestically, according to Solutionary. The U.S. hosts approximately 5 times …
Security concerns are still holding back cloud adoption
There are significant differences in public cloud infrastructure concerns between the cloud-wise, organizations that are currently using cloud services, and the cloud-wary, …
When can you trust web services to handle your data?
A new report by the EU’s cyber security agency ENISA analyses the conditions under which online security and privacy seals help users to evaluate the trustworthiness of …
Mobile applications being used for DDoS attacks
Prolexic Technologies reported that mobile applications are being used in DDoS attacks against enterprise customers. “The prevalence of mobile devices and the widespread …
Light Patch Tuesday delivers four bulletins
With only four bulletins, this month’s release is the lightest in recent memory. Markedly missing are any bulletins for Internet Explorer and not a single bulletin is …
Understanding mobile security pressure points and vulnerabilities
41 percent of the government employees who used the assessment tool are putting themselves and their agencies at risk with existing mobile device habits, according to a Mobile …
Top 7 security concerns for 2014
AhnLab announced its “Top 7 Security Concerns for 2014”. Because AhnLab is immersed in the cyber trenches and the cloud, its team is very experienced monitoring …
(ISC)2 Foundation offers $145,000 in information security scholarships
The (ISC)2 Foundation, the non-profit charitable trust that aims to empower students, teachers, and the general public to secure their online life with community cyber …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous