Help Net Security
The Apple and WoW effect
Modern living is defined by pop culture phenomena. In the last few months alone, 4G rollouts, the release of smart watches and launch of long-awaited video games have all …
Free secure messaging app from Carnegie Mellon researchers
Carnegie Mellon University CyLab researchers have developed a free smartphone app for iOS and Android users to safely exchange identity data without risk of theft, deception …
Video: Recent advances in IPv6 security
There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less …
Users want to access all their content in just one secure place
Are you managing your content, or is your content managing you? An F-Secure survey shows that, with their photos, videos, and other documents scattered across various cloud …
Beginning of a new era: The digital industrial economy
Worldwide IT spending is forecast to reach $3.8 trillion in 2014, a 3.6 percent increase from 2013, but it’s the opportunities of a digital world that have IT leaders …
Webroot delivers data, identity and threat protection
Webroot released the latest updates to its Webroot SecureAnywhere portfolio. The latest release brings new detection technology to block emerging malware and phishing attacks …
Most unauthorized data access goes undetected
With a focus primarily on large enterprise organizations, a Vormetric study of 700 IT security decision-makers indicates that there are major gaps between existing security …
Vulnerable and aggressive adware threatening millions
FireEye discovered a new mobile threat from a popular ad library that no other antivirus or security vendor has reported publicly before. Mobile ad libraries are third-party …
How to establish trust in the cloud
Business is increasingly taking place outside the corporate firewall. Employees are using their own devices and turning to consumer-grade cloud file sharing services to allow …
Video: How the grid will be hacked
There is a never ending stream of vulnerabilities in the mechanical and cyber systems that support the grid. So, why hasn’t there been any significant breach of the …
GnuPG 2.0.22 fixes security problem
GnuPG 2.0.22 is a security fix release and all users are advised to updated to this version. What’s new: Fixed possible infinite recursion in the compressed packet …
Enterprise tech projects increasingly funded by business, not IT
According to a new IDC survey of 1,200 line of business executives, 61% of enterprise technology projects are now funded by the business rather than the IT department, and IT …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations