Help Net Security
2011 CWE/SANS top 25 most dangerous software errors
SANS and Mitre have released the CWE/SANS Top 25 Most Dangerous Software Errors list for 2011. The list was compiled with the help of a great number of security experts from a …
45 million U.S. individuals manipulate their identities
When does a little white lie become fraud? An estimated 45 million people in the U.S. have deliberately manipulated their identities in applications for credit, cell phone …
Free anti-virus technology for Amazon EC2
AVG announced free anti-virus technology for Amazon EC2 users. The preconfigured software bundled within an Amazon Machine Image (AMI) is now available on the Amazon Web …
iOS and Android more secure than PCs?
While the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets …
Gannett Government Media user information stolen
The Gannett Government Media family of websites suffered a cyber attack on resulting in unauthorized access to files containing user information. The information in those …
Encrypted voice calling for the iPhone
Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …
Security vendor applauds LulzSec attacks
In an unexpected move for a security company, SecurEnvoy today said that cyber break-ins and advanced malware incidents, such as the recent DDoS attack by LulzSec, should …
Identity theft doesn’t take vacations
Identity theft is a real risk and one that is amplified during the summer months. Recent survey results indicated that, whether booking flights at home, logging on at a Wi-Fi …
Protect your computer and phone from illegal police searches
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search …
Privacy and data breach solutions for healthcare
Today, data breach in healthcare is a surreptitious threat, with a data breach in healthcare occurring every two days. Complicated by federal and state governments regulating …
Internet myths putting Americans at risk
Americans’ knowledge of Internet security is scattered with misconceptions and fallacies that expose PC users to a slew of online threats, according to G Data Security. …
European study unveils IT security strategies
Fortinet unveiled the findings of a survey into the IT security strategies which queried enterprise IT decision makers in France, Germany, Italy, Spain, Benelux and the UK …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised