Help Net Security
Global credit card fraud network dismantled
44 members of a global credit card fraud network have been arrested in a joint operation coordinated by the Romanian Cybercrime Unit in Romania, in close cooperation with …
A look at how consumers safeguard their devices
While consumers who have lost a smartphone or had one stolen in the past are significantly more likely to be taking basic protective measures with their current device, nearly …
The Computer Fraud and Abuse Act: Swartz, Auernheimer, and beyond
The Computer Fraud and Abuse Act is controversial for its broad reach and potential for misuse. In this video from Shmoocon 2013, Professor Orin Kerr and Marcia Hofmann from …
Spam filters are blocking less spam
Virus Bulletin announced the results of its latest anti-spam comparative review: 17 solutions achieved a VBSpam award, but the majority did so with a lower spam catch rate …
TypeWATCH: Advanced persistent e-biometrics
Watchful Software released TypeWATCH 1.2, an e-biometrics solution that leverages the science of Keystroke Dynamics to identify and authenticate users simply by the way they …
Wi-Fi sensors for remote monitoring
Monnit released a new line of Wi-Fi sensors, known as MoWi. These sensors use an integrated, 2.4GHz – 802.11b/g, FCC/CE certified radio transmitter. This allows them to …
Thousands of Amazon S3 buckets left open exposing private data
Cloud hosting and cloud storage is all the rage, but there are still some common pitfalls that many organizations overlook. In this article I will walk through an issue that …
Top April Fools’ Day hoaxes throughout history
April Fools’ Day is a time for practical jokes, hoaxes and laughs. However, it’s important to understand that April Fools’ Day is also an ample opportunity …
Most IT admins considering quitting due to stress
The number of IT professionals considering leaving their job due to workplace stress has jumped from 69% last year to 73%, underlining the increasingly challenging business …
Computer forensic examiners are from Mars, attorneys are from Venus
The outcome of high stakes investigations and litigation can often depend on the evidence uncovered through computer forensic investigation. That fact highlights the critical …
Malware analysis: Collaboration, automation and training
Whether you’re a novice or a professional at analyzing malicious code, you’ll have a desire to learn or pass on that skill. Most malicious code analysis is …
Federal agencies willing, but not ready, for Big Data
More than 75 percent of federal managers believe Big Data has the power to fundamentally transform federal operations, according to the Government Business Council (GBC) and …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems