Help Net Security
South Korean organizations under cyber attack
A suspected cyber attack has paralyzed computer networks at three broadcasting organisations and two banks in South Korea. The organizations’ networks had been …
Protecting sensitive information on iOS devices
We’ve seen the deep technical research showing what makes iOS devices secure (or sometimes not so much). But once you grok ASLR and code signing, are you really any …
Linux community adopts UEFI technology
The Unified Extensible Firmware Interface (UEFI) Forum, a non-profit industry standards body of leading technology companies that promotes firmware innovation by creating …
ID Network Attributes provides insight into identity risk
ID Analytics launched ID Network Attributes, targeted consumer behavior insights that provide visibility into the risk of an identity or transaction. Available in both Fraud …
Hacking as an act of war
Once the exclusive domain of a small number of geniuses, hacking has gone mainstream as an element of national defense. The United States has established a four-star Cyber …
3,600 organized crime groups active in the EU
In the most detailed study ever undertaken of its kind in the European law enforcement community Europol has identified an estimated 3,600 organized crime groups currently …
The role of critical risks in internal audits
As companies have come to accept that market volatility, complexity, political and regulatory changes are here to stay, internal audit functions have more opportunities to …
Data breaches in higher education
TeamSHATTER reports on data breaches in the higher education vertical throughout the United States. The past year has seen a substantial uptick in the amount of total records …
Splunk integrates with relational databases
Splunk announced Splunk DB Connect, which delivers scalable, real-time integration between Splunk Enterprise and traditional relational databases. With Splunk DB Connect, …
AVG CloudCare adds new email security services
AVG announced a new release of AVG CloudCare, the cloud based administration platform that allows remote deployment and management of IT and security services for SMBs. The …
Free Android malware analysis tool
Bluebox Labs announced Dexter, a free tool to help researchers and enterprise security teams analyze applications for malware and vulnerabilities. The Dexter platform provides …
Virtual classroom for incident response
To provide digital investigators and other incident responders the tools and skills to detect and respond to targeted attacks, HBGary announced a series of new live online …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems