Help Net Security
Restrictive e-mail policies: Hidden security risks for business
IT departments are fighting a losing battle in seeking to constrain employees’ behavior through policy alone, according to Mimecast. Findings suggest that a new approach …
March Patch Tuesday details
In the video below, Qualys CTO Wolfgang Kandek and Qualys vulnerability labs manager Amol Sarwate discusses this month’s Microsoft Patch Tuesday release.
Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities have been reported in Google Chorme, according to Secunia. Some have an unknown impact while others can be exploited by malicious people bypass …
Fraud losses drop on cards, cheques and online banking
New figures show that banking industry initiatives are successfully keeping the fraudsters away from customers’ cards and bank accounts. Fraud losses on UK cards, …
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 9 delivers improved compatibility, security, and …
Risks to address when contracting for cloud services
Gartner has identified four risky issues that CIOs and sourcing executives should be aware of when contracting for cloud services. “Cloud service providers will need to …
AV industry fails to cover the basics
NSS Labs released two test reports of endpoint protection products which reveal new shortcomings in these widely deployed products. They cover multi-vector attacks (malware …
New variant of SpyEye banking malware
Norman researchers identified an emerging variant of the SpyEye Trojan that targets specific online banking applications. SpyEye is a malware toolkit that has become …
The privacy impact of electronic health records
While patients trust their doctors to protect their information, 49 percent believe that EHRs will have a negative impact on the privacy of their PHI and health data, …
Microsoft patches four vulnerabilities in Windows and Office
Today Microsoft released three security bulletins: one is rated Critical and two are rated Important. The bulletins address four unique vulnerabilities in Microsoft Windows …
Evaluate the effectiveness of your cyber armor
When evaluating our effectiveness in dealing with cyber defense, we have two layers of uncertainty and risk: how effectively are we protecting critical information, and what …
(IN)SECURE Magazine issue 29 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 29 has been released today. Table of contents …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)