Help Net Security
Video: Light painting Wi-Fi
This project explores the invisible terrain of Wi-Fi networks in urban spaces by light painting signal strength in long-exposure photographs. A four meter long measuring rod …
Critical data exchange in the cloud
The pace of business today requires that critical information can be accessed anywhere, anytime. Furthermore, this sharing of information often happens amongst both internal …
Week in review: Facebook scams, OddJob Trojan and corporate espionage via social networks
Here’s an overview of some of last week’s most interesting news and articles: New types of cookies raise online privacy concerns The advertising industry has led …
Social media authenticity, privacy and security
Panda Security is providing guidance on ways to safely and securely integrate social media strategies into an SMB. Panda Security discovered that 78 percent use social …
Going “eye to eye” with network security threats
One of the ironies of our increasingly technology-dependent society is that you need an ever increasing amount of technology to address the failings or risks of the technology …
Failure to invest in secure software a major risk
Failure to take software security seriously is putting organizations, brands and people at risk, according to a report by Creative Intellect Consulting. Key highlights from …
Integrated single sign-on and authentication to cloud and SaaS
SafeNet announced Authentication Manager (SAM) 8.0. The unified enterprise platform combines strong authentication and identity federation to help organizations centrally …
Apple releases developer preview of Mac OS X Lion
Apple released a developer preview of Mac OS X Lion, which takes some of the best ideas from iPad and brings them back to the Mac. The Lion preview is available to Mac …
Malware-driven pervasive memory scraping
Reports are coming in of a new trend in hacking techniques. Known as “pervasive memory scraping,’ the technique relies on the fact that certain areas of Windows …
Spyware compromises 150,000+ Symbian devices
A new variant of spyware “Spy.Felxispy” on Symbian devices causing privacy leakage has recently been captured by the National Computer Virus Emergency Response …
41% of organizations not aware of security risks
41 percent of organizations are not well aware of or protected against IT security risks, according to McAfee. Another 40 percent are not completely confident they can …
BIND Denial of Service vulnerability
A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a Denial of Service, according to Secunia. When an authoritative server …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)