Help Net Security
Data breaches erode trust in business
Recurring data breaches over the past five years have undermined public trust in the ability of both private firms and Government organisations to safeguard personal …
Enterprise DIY data erasure
Kroll Ontrack launched Ontrack Eraser 4.0, an enterprise data eraser solution, complete with expanded drive wiping capacity, VMware eraser capabilities and new reporting and …
Europol launches European Cybercrime Centre
The new European Cybercrime Centre (EC3) based at Europol headquarters in The Hague will be officially launched on Friday, January 11, and will be the focal point in the …
New Java 0-day exploited in the wild
A new Java zero-day being exploited in the wild has been found. With the files we were able to obtain we reproduced the exploit in a fully patched, new installation of Java. …
Corporate risk hotspots identified
Corporate risk prevention consultancy Riskskill, a division of UKFraud, has opened the New Year with a list of what they believe are the 8 biggest corporate risk hotspots …
Bogus U.S. Airways registration confirmation leads to info-stealing malware
A new email spam campaign impersonating U.S. Airways is hitting inboxes, warns Webroot, and the airline’s customers would do well to be on the lookout for the following …
Businesses overconfident about cyber security
Recent research from Deloitte has highlighted that firms in technology, media and telecommunications are confident that they are safe from cyber attacks and data security …
Check Point introduces ZoneAlarm 2013
Check Point introduced its new ZoneAlarm 2013 security product line, which is Windows 8 compatible and first to integrate a new Facebook Privacy Scan and “Do Not …
Big Data market to reach to $23.8 billion in 2016
IDC projects that the worldwide Big Data technology and services market will grow at a 31.7% compound annual growth rate (CAGR) – about seven times the rate of the …
Sophos tackles BYOD challenges
Sophos announced Sophos EndUser Protection, a new security offering that tackles the challenges associated with bring-your-own-device (BYOD), and the increasing number of …
Data security tips for healthcare organizations
It’s that time of year when everyone wants to be healthier. Eat better. Lose weight. Manage stress. Save money. These rank as peoples’ top New Year’s …
Military IT dependence could result in fatal cyber attacks
This week, MPs on the Defence Select Committee have produced a report stating that the UK’s armed forces are now so dependent on IT that they could be “fatally …