Help Net Security
CIOs lack the vision when it comes to mobility
Mobile Helix announced the findings of an independent CIO survey of 300 IT decision makers in the UK and US; exploring how enterprises are making use of mobile technology. The …
Financial services cyber security trends for 2014
Five years ago, questions directed at boards of directors and senior executives at financial services firms on the toughest risk management issues might have resulted in …
ENISA provides new guide for mitigating ICS attacks
The EU’s cyber security agency ENISA has provided a new manual for better mitigating attacks on Industrial Control Systems (ICS), supporting vital industrial processes …
Over 80% of employees use unauthorized apps at work
More than 80 percent of employees admit to using non-approved SaaS applications in their jobs, say the results of a McAfee survey. But what’s even more interesting is …
Fake Amazon “Order Status” emails deliver malware
It comes as no surprise that as holiday shoppers begin to flood the internet looking for deals, the bad guys will be right behind them hoping to swoop in on an unsuspecting …
9 out of 10 consumers would rather companies didn’t store their info
In the wake of data scandals, consumer trust in data security has hit a ten year low, with over 1 in 10 suffering from a data loss, Fujitsu’s data research report has …
Passwords aren’t going away any time soon
Despite nearly weekly revelations of new password database breaches, a survey by Authentify suggests that passwords will remain the primary protection for online accounts. Of …
Experts offer cyber security forecast for the year ahead
Kroll released its third annual Cyber Security Forecast, a prediction of the most significant cyber issues organizations will confront in 2014. The latest forecast highlights …
(IN)SECURE Magazine issue 40 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 40 has been released today. Table of contents: How …
Security gate for open doors
Internet crime has evolved to a full blown cyber-war, using internet servers as virtual soldiers to take down critical network infrastructures, or to steal information. While …
Top six security threats for 2014
The Information Security Forum (ISF) has announced their forecast of the top six security threats global businesses will face in 2014. Key threats include BYOD trends in the …
Shopping convenience overrides security concerns
Tripwire announced the results of a survey on mobile security and holiday shopping. The survey was conducted by Dimensional Research and OnePoll from November 18-20, 2013, and …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous