Help Net Security
75% of consumers want mobile banking services
Consumer interest in mobile banking and payments services offered by their financial institution has increased significantly in the past two years, according to new findings …
Secure single sign-on for SaaS users
Ping Identity released PingFederate 5.2, the most complete Internet single sign-on software solution for SaaS users and SaaS vendors. It incorporates key technologies from …
95% of financial institutions vulnerable to data theft
TraceSecurity revealed today its five-year statistics on social engineering and penetration testing. The statistics show that 95% of U.S. financial institutions’ …
Google takes another step to protect user privacy
Google announced a new logs retention policy. They pledge to anonymize IP addresses on their server logs after 9 months. That’s a significant shortening of their …
Types of Web-Based Client-Side Attacks
While my research is primarily concerned with drive-by-download attacks, I thought I try to summarize other web-based client-side attacks that are out there, many of which are …
Doubling of the number of crimeware-spreading URLs
The APWG announced today that its first quarter survey reveals a near doubling of the number of crimeware-spreading URLs at the end of the period, up from the previous record …
World’s first unclonable RFID chip
Verayo launched the world’s first unclonable silicon chip – the Vera X512H RFID chip. This new RFID chip is based on recently announced breakthrough technology …
Inbound threat protection and outbound content security platform
BorderWare Technologies introduced BorderWare Security Platform 8.0, the industry’s first security appliance to provide comprehensive email and Web security with …
Advanced hybrid location solution
Polaris Wireless announced the Polaris Wireless Advanced Hybrid Solution which is designed to work in conjunction with A-GPS systems to consistently provide the highest …
SOX, Lies and Security Matters
When it comes to compliance, it’s fairly easy to find out what companies need to do to achieve it. But it’s much harder for companies to find out how they should …
Spam served as visual poetry
Alex Eckelberry posted some interesting screenshots to the Sunbelt Blog. As Alex notes, they show a cute way of bypassing the filters: If you select the text, you see …
IT security spending on the rise
Spending on IT security will continue to grow next year, according to new data unveiled by Forrester Research. The Forrester Business Data Services survey, which polled more …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online