Help Net Security
Don’t get pwned at Black Hat, DEF CON
I am not a paranoid person and most industry conferences I go to don’t generate any worries about security. You go and participate, but otherwise operate normally, …
Offshore providers with no cloud strategy risk their future
While the increased use of industrialized services will reduce the volume of traditional and customized services, the impact on offshore providers will be counterbalanced by …
Week in review: Critical SIM encryption flaw, Apple Dev Center hack, key security metrics
Week in review: Critical SIM encryption flaw, Apple Dev Center hack, key security metrics Here’s an overview of some of last week’s most interesting news, reviews …
Preventing the exploitation of human vulnerabilities
Secure Mentem released the Human Incident Response Service to specifically address the issue of exploiting human vulnerabilities. Some of the most noted attacks in recent …
NTODefend now more effectively blocks application vulnerabilities
NT OBJECTives announced that its NTODefend solution now blocks application vulnerabilities by approximately 30% more than the previous version. As a result, NTODefend’s …
Five charged with stealing 160+ million credit card numbers
A federal indictment made public in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole …
The impact of weak threat intelligence on organizations
A new Ponemon Institute study, which includes a survey of more than 700 respondents from 378 enterprises, defines what “live threat intelligence” is; how global …
IBM unveils software to identify and predict security risk
IBM announced an integrated security intelligence solution that helps organizations identify key vulnerabilities in real-time. QRadar Vulnerability Manager gives security …
Cyber security is central to long-term economic growth
An increase in attacks on corporate websites should focus attention on the actions businesses should take to reduce the impact of cybercrime. The word of caution comes in the …
Record malware growth in China, Ukraine and Saudi Arabia
51,000 new mobile malware threats were identified in the first half of 2013, infecting an estimated 21 million mobile devices, according to NQ Mobile. Highlights of report …
Economic growth and national security are at risk
FTSE 350 companies that are vital to Britain’s economic growth, and crucial to national security, are leaking data that can be used by cyber attackers to gain control of …
Bit9 Introduces enterprise Mac security
Business users are driving demand for Macs across the enterprise. Until now, the few enterprise security products available for the Mac were dependent on malware signatures …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?