Help Net Security
Study examining the usage of hardware-based encrypting drives
The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …
Most organization experienced data loss
75% of UK organizations experienced data loss in the last year, compared with an average of 77% internationally, according to Check Point. Key findings from the survey show …
Cybercriminals targeting sporting events and music festivals
BitDefender identified a series of scams targeting music festival goers, sporting event fans and holidaymakers this summer. The top summer-themed spam messages for 2011 relate …
Forensic data capture and data extraction
Logicub announced the Talon Enhanced forensic data capture solution and the CellXtract data extraction solution for mobile devices. The Talon Enhanced provides fast data …
Drupal Prepopulate Module vulnerabilities
Two vulnerabilities have been reported in the Prepopulate module for Drupal, which can be exploited by malicious users to conduct script insertion attacks and by malicious …
How search engine poisoning works
Imperva disclosed the intricate workings of a Search Engine Poisoning (SEP) campaign. The attack was extremely successful and continued to run for at least 15 months without …
Tips for embracing cloud computing
In today’s complex landscape of constant innovation and change, organizations should take advantage of emerging capabilities, skills and processes to address their …
Trends in the badware landscape
Badware is a defining challenge for individuals, businesses, and governments throughout the world. Cybercriminals have developed a mature badware economy in which individual …
Free tool protects against harmful links
Today website owners, bloggers and forum administrators are faced with many security concerns that can get in the way of what they really want to be doing – which is …
Cybersecurity, innovation and the Internet economy
The U.S. Department of Commerce today released a report that proposes voluntary codes of conduct to strengthen the cybersecurity of companies that increasingly rely on the …
Google enhances Safe Browsing protection in Chrome
Google released Chrome 12 to the Stable Channel for all platforms. Chrome 12.0.742.91 includes a number of new features and updates, including: Hardware accelerated 3D CSS New …
Can RSA repair the broken trust?
Despite Art Coviello’s open letter offering to replace tokens for customers, we are still none the wiser as to what assets within RSA were compromised during the breach …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)