Help Net Security
Reactions to the Yahoo Mail hack
Unknown attackers have attempted to access a number of Yahoo Mail accounts and urged users to change their passwords even if they haven’t been affected. Here are some of …
Global view of attack traffic and security
Akamai released its latest report, which provides insight into key global statistics on attack traffic and security. Akamai maintains a distributed set of unadvertised agents …
Why governance and policy can strengthen compliance efforts
A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …
10,000+ UK systems affected by ICEPOL Trojan ransomware
At least 10,331 successful installs of ICEPOL Trojan ransomware took place in the UK last year. Bitdefender’s Cybercrime Investigation Unit analysed the disk images of …
Check Point discovers critical vulnerability in MediaWiki
Check Point found a critical vulnerability in the MediaWiki project Web platform, a popular open source Web platform used to create and maintain ‘wiki’ Web sites. …
Risky online behaviour is putting teens in danger
Research by McAfee and the Anti-Bullying Alliance has found that 14-15 year old teenagers are most likely to adopt risk-taking behaviours and overshare online; putting …
Data mining the future with security predictions
It has become somewhat of a tradition for information security vendors to pull out their crystal balls at the end of each year and do their best to predict interesting …
Many Android apps can track your location, access photos
An alarming proportion of Android applications can find and open private photographs on smartphones, track users’ locations, divulge e-mail addresses over the internet …
SpyEye creator pleads guilty
Aleksandr Andreevich Panin, a Russian national also known as “Gribodemon” and “Harderman,” has pleaded guilty to conspiracy to commit wire and bank …
Surge in mobile network infections affects millions of devices
Security threats to mobile devices continues its rapid rise, infecting at any time more than 11.6 million devices and putting their owners at increased risk for stolen …
Smartphone spying: How can users protect themselves?
Smartphone users need to realise that their mobile phone is less of a phone and more of a mobile computer, in which applications can collect data from other applications …
Consumers care more about business data collection than government surveillance
TRUSTe released its latest U.S. Consumer Confidence Index, which shows that a high proportion of U.S. adults aged 18 and older are worried about their privacy online, online …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)