Help Net Security
Facebook Timeline Remover is still alive
You may have seen reports of a Facebook themed “remove my timeline” scam, where users are asked to install a browser extension to roll Facebook back to the way it …
Monitoring employee behavior in digital environments is rising
Monitoring employee behavior in digital environments is on the rise, with 60 percent of corporations expected to implement formal programs for monitoring external social media …
Database security and SIEM are top priorities
Database security and SIEM are among the top priorities due to increased advanced persistent threats, according to McAfee. Database security has been an ongoing concern for …
Scammers working harder to fool consumers
The number of unique phishing reports submitted to the APWG rose substantially from early fall through the end of the year, while cybercrime gangs were apparently forced to …
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current …
NSA launches cyber security program for college students
The US National Security Agency has launched a National Centers of Academic Excellence in Cyber Operations Program to ultimately yield a larger pool of professionals with …
Will the new EU privacy legislation secure Europe’s digital economy?
At the start of 2012, the European Commission announced it is to undertake a comprehensive review of the EU’s 1995 data protection rules. Its aim is to strengthen online …
Nominum releases mobile security solution
Faster mobile networks, explosive consumer demand, more powerful smartphones, and the influx of non-handset mobile-ready devices make mobile networks an attractive option for …
Week in review: New Nmap released, Zeus Trojan comes with ransomware, and SMS spying app on Google Play
Here’s an overview of some of last week’s most interesting news, podcasts and articles: IEEE introduces standard for body area networking IEEE announced a new …
Cloud computing choices
The cloud provides an alternative way of procuring IT services that offers many benefits, including increased flexibility as well as reduced cost. It extends the spectrum of …
Photos: HITBSecConf 2012 Amsterdam
Taking place this week in Amsterdam is the well-known HITBSecConf that features deeply technical talks, workshops, hands-on lab sessions, a brand new attack and defense …
Mobile security threats cause confusion
UK and US businesses are in a state of uncertainty around if, and how, to protect their networks against the threats brought about by mobile devices entering the workplace. …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?