Help Net Security
Best practices from healthcare and compliance experts
Data breaches in healthcare are raising alarm. Nearly 20 million patient health records have been compromised in the past two years, according to the U.S. Department of Health …
Windows 8 launch prompts thoughts on life after XP
Much has been made of the extensive changes that Microsoft has revealed around the aesthetics and performance of Windows 8, as well as the possible effects these changes will …
The anatomy of cyber security exercises
In its new report, the EU’s ‘cyber-security agency’ ENISA (the European Network and Information Security Agency) examines 85 national and international …
Real user monitoring for web developers
AppNeta announced Real User Monitoring (RUM) capabilities designed for web development and application performance. As a key feature of AppNeta’s TraceView application …
Steganos Privacy Suite 14 released
The newly released Steganos Privacy Suite 14 is designed for individuals who want privacy protection for their data and Internet activities – including on their …
Microsoft releases Windows 8
Microsoft today announced the global availability of Windows 8. Beginning Friday, Oct. 26, consumers and businesses worldwide will be able to experience all that Windows 8 has …
Video: Bill Gates on Windows 8, Windows Phone 8 and Surface
Here’s Bill Gates talking about the significance of this week’s launch of Windows 8, about Windows Phone 8 and Surface.
Banker pleads guilty to sharing personal information of account-holders
LeRoy Brown, a former personal banker from Washington, D.C., pled guilty to conspiracy to commit bank fraud for his role in an identity theft scheme involving $121,400 in …
New cybercrime monetization methods
AVG’s new report investigates a number of malicious software developments including the newly launched 2.0 version of the Blackhole Exploit Toolkit, the evolution in …
Worst passwords of 2012
Just in time for Halloween comes something that might scare anyone who spends a lot of time online: SplashData’s annual list of the most common passwords used on the …
Phishing websites proliferate at record speed
A new phishing survey released by the Anti-Phishing Working Group (APWG) reveals that while the uptime of phishing websites dropped during the first half of 2012, …
Most effective ways to stop insider threat
Imperva examined the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a …
Featured news
Resources
Don't miss
- How to give better cybersecurity presentations (without sounding like a robot)
- Layoffs pose a cybersecurity risk: Here’s why offboarding matters
- Fake AI platforms deliver malware diguised as video content
- LockBit hacked: What does the leaked data show?
- May 2025 Patch Tuesday forecast: Panic, change, and hope