Help Net Security
Bruce Schneier on power and security
In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. …
Week in review: Car hacking, Opera breach, and Carberp source code leaked
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Snowden on the run, leaks continue unabated Documents he shared with …
FDA shut down 1,677 illegal pharmacy websites
The U.S. Food and Drug Administration, in partnership with international regulatory and law enforcement agencies, took action this week against more than 9,600 websites that …
Bruce Schneier joins EFF board of directors
The Electronic Frontier Foundation (EFF) announced the newest member of its Board of Directors: security expert Bruce Schneier. Schneier is widely acclaimed for his criticism …
Most Internet users have fallen victim to malware
The current state of cyber-security has left US Internet users anxious about hacks and password theft. Despite constant victimization, the majority are not using two-factor …
Abuse of mobile app permissions
McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy …
Explore, analyze and visualize data in Hadoop
Splunk announced the beta version of Hunk: Splunk Analytics for Hadoop, a new software product that integrates exploration, analysis and visualisation of data in Hadoop. Hunk …
Lord Sebastian Coe to keynote RSA Conference Europe 2013
RSA Conference announced Olympic champion, politician and former chair of the 2012 Summer Olympic & Paralympic Games, Lord Sebastian Coe to its lineup of keynote speakers …
Citadel Trojan automatically localizes fraud content
Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …
Attitudes towards data protection and encryption in the cloud
An increasing number of organizations are transferring sensitive or confidential data to the cloud despite concerns over data protection, according to the Ponemon Institute. …
Can DDoS attackers turn mitigation devices against you?
SYN reflection attacks are one of the more sophisticated DDoS attack methods and typically require some skill to execute. However, they have recently grown in popularity as …
Mobile and cloud data risks exposed
A new Ponemon eport focuses on the risks associated with employee access to regulated data, such as protected health and financial information, via company or personal mobile …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy