Help Net Security
How do you protect your phone and your data?
Given the risks we run in not securing our phones, you’d be forgiven for thinking it must be a task requiring a doctorate in computer science. In reality, however, …
Practical steps to minimize data privacy threats
Google comes across 9,500 new malicious websites each day and responds by sending notifications to webmasters. Nevertheless, these websites are just one of the many dangers …
Oil and gas infrastructure cybersecurity spending to increase
As a highly critical sector, the oil and gas infrastructure should be one of the most secure, both physically and digitally. This is not the case. A multi-billion dollar …
The effectiveness of bug bounty programs
Veracode released an infographic that examines the success of bug bounty programs. The past decade has witnessed major growth in demand for bug hunters, with online giants …
DDoS attack sizes plateau, complex multi-vector attacks on the rise
Arbor Networks released its 8th Annual Worldwide Infrastructure Security Report (WISR) offering a rare view into the most critical security challenges facing today’s …
Trojan stole over 16,000 Facebook credentials
ESET discovered a social engineering Trojan horse that managed to steal the login credentials of more than 16,000 Facebook users. The ‘PokerAgent’ Trojan targeted …
Cross-site scripting attacks up 160%
Each quarter, FireHost reports on the Superfecta – a group of four cyberattacks that are the most dangerous – and warns that both Cross-Site Scripting and SQL …
The dangers of third-party code for cloud security
Imperva announced a new report which examines the dangers of third-party code in cloud computing. In December 2012, a hacker breached Yahoo! with an SQL injection attack that …
Privacy tips for social networking, apps and geolocation
Many people confuse data privacy and data security. While there are similarities, privacy and security are not the same thing. Data security focuses on the confidentiality, …
48% of IT staff fear unauthorized access to virtual servers
Data security in visualized environments is often neglected by IT organizations, with 48% either reporting or suspecting unauthorized access to files on visualized servers, …
HP helps organizations define a security strategy
HP announced a new set of security services that help organizations respond to, remediate and mitigate the impact of security breaches as they occur. Security breaches are …
cPacket Networks unveils network performance and monitoring solution
cPacket Networks announced a new network performance and monitoring solution that radically simplifies the way in which cloud and data center professionals pinpoint issues. …