Help Net Security
CompTIA Security+ eTestPrep (SY0-301)
This custom test engine product is packed with more than 700 practice exam questions, each containing a link to an integrated e-book version of Sybex’s top-selling …
Week in review: LinkedIn password leak, iOS security guide published, Flame spreading via Windows Update
Here’s an overview of some of last week’s most interesting news, videos and articles: Consumers confused about data breaches According to more than 700 survey …
The effect of data breaches on consumers
Commenting on a Ponemon Report showing that 72 per cent of consumers who have been notified of a data breach at a company they had dealt were dissatisfied with the …
Microsoft to release seven bulletins next week
The Microsoft Security Bulletin Advance Notification for June 2012 lists seven bulletins, three of which are rated “critical” and four “important.” The …
Security Metrics, A Beginner’s Guide
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of …
Over 50% use unauthorized file sharing apps at work
While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …
The rise of Tumblr and Google Play spam campaigns
In May, GFI threat researchers observed a number of attacks focused on Tumblr users including two spam campaigns centred around a fake “Tumblr Dating Game” which …
People would rather lose their wallet than their phone
People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …
Damballa enhances cyber threat protection for ISPs
Damballa announced general availability of CSP 1.7, a cyber threat solution for ISPs and telecommunications providers that detects subscriber malware infections by monitoring …
Gaps in anti-bribery compliance at multinational corporations
Despite a steady increase in Foreign Corrupt Practices Act (FCPA) investigations and enforcements over the last several years, the majority of corporate compliance officers at …
LogRhythm and Imperva partner on database and web application security
LogRhythm announced a partnership with Imperva. It includes technical integration that enables Imperva’s SecureSphere solution to feed data to LogRhythm’s SIEM 2.0 …
How fraudsters are disguising PCs to fool device fingerprinting
Cybercriminals know that financial and ecommerce providers often use fraud detection systems that monitor for anomalous transactions and behaviors. In order to bypass these …
Featured news
Resources
Don't miss
- Inside Microsoft’s veteran-to-tech workforce pipeline
- Brakeman: Open-source vulnerability scanner for Ruby on Rails applications
- Incident response lessons learned the hard way
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years