Help Net Security
Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles:European Internet users urged to protect themselves against …
Windows Live ID scam targets personal information
Kaspersky Lab experts are warning of a new scam that uses Windows Live ID as bait to catch personal information stored in user profiles on services like Xbox LIVE, Zune, …
Malware upsurge threatens millions of POS devices
Notable brands like Target, Neiman Marcus, PF Changs, Staples, Michaels Stores, and Home Depot have all have become victims of point of sale (POS) security breaches targeting …
Most organizations value threat intelligence sharing
94% of respondents to an Enterprise Strategy Group (ESG) study believe it is highly or somewhat valuable to share threat intelligence information between federal agencies and …
Companies stay vulnerable to web attacks for far too long
While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to …
The rise in false fraud alerts
68% of Americans who have received a fraudulent activity alert from their credit or debit card issuer have received at least one alert in error, according to …
Can you afford to wait 197 days to detect a threat?
Financial services and retail organizations agree, advanced threats are the most serious security challenge facing their organizations, shows a new Ponemon Institute study. …
New UK law says GCHQ agents cannot be prosecuted for hacking
In a job posting published last week, the Government Communications Headquarters (GCHQ) – the UK version of US’ National Security Agency – openly announced …
The cybersecurity domino effect
RedSeal unveiled its survey of high-ranking executives that illustrates widespread concern regarding the potential effects of cyberattacks in corporate America.Most of the …
The importance of good threat intelligence
The cyber-threats our organizations face are continuing to evolve, partly in respect to the broadening motivations behind attacks, and partly due to the increased …
Secure smart devices for the holiday season
Summer is almost here and many are currently considering taking their beloved smart devices with them on their travels. However, the risks of doing so are sizeable.With a …
There’s no security without trust
Trust. It’s a small word but it conveys a lot. To many it is the cornerstone of security, because without trust there can be no security. To operate securely in the online …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform