Help Net Security
The effect of data breaches on consumers
Commenting on a Ponemon Report showing that 72 per cent of consumers who have been notified of a data breach at a company they had dealt were dissatisfied with the …
Microsoft to release seven bulletins next week
The Microsoft Security Bulletin Advance Notification for June 2012 lists seven bulletins, three of which are rated “critical” and four “important.” The …
Security Metrics, A Beginner’s Guide
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of …
Over 50% use unauthorized file sharing apps at work
While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …
The rise of Tumblr and Google Play spam campaigns
In May, GFI threat researchers observed a number of attacks focused on Tumblr users including two spam campaigns centred around a fake “Tumblr Dating Game” which …
People would rather lose their wallet than their phone
People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …
Damballa enhances cyber threat protection for ISPs
Damballa announced general availability of CSP 1.7, a cyber threat solution for ISPs and telecommunications providers that detects subscriber malware infections by monitoring …
Gaps in anti-bribery compliance at multinational corporations
Despite a steady increase in Foreign Corrupt Practices Act (FCPA) investigations and enforcements over the last several years, the majority of corporate compliance officers at …
LogRhythm and Imperva partner on database and web application security
LogRhythm announced a partnership with Imperva. It includes technical integration that enables Imperva’s SecureSphere solution to feed data to LogRhythm’s SIEM 2.0 …
How fraudsters are disguising PCs to fool device fingerprinting
Cybercriminals know that financial and ecommerce providers often use fraud detection systems that monitor for anomalous transactions and behaviors. In order to bypass these …
Most trusted universities for online activity
After analyzing online transactions such as credit applications and e-commerce purchases, iovation found the University of California at San Francisco to be the university …
Free dual-engine portable malware scanner
Emsisoft Emergency Kit 2.0 protects against malware infections of any kind. It is fully portable and therefore requires no installation whatsoever, ready to be launched …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous