Please turn on your JavaScript for this page to function normally.
Windows 8 Inside Out

When Microsoft CEO Steve Ballmer launched Windows 8, he dubbed it a re-imagined operating system. When you introduce so many new features and a different UI, you're going to …

Social engineering: Clear and present danger

Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …

The privacy implications of Facebook Graph Search

With a billion people sharing an assortment of personal information on a daily basis, Facebook holds the most significant amount of private information in today’s …

Information risks in the enterprise

Ian Whiting is the CEO Titania, a developer of security auditing and testing software. In this interview he discusses managing information-related risks in the enterprise, …

High-risk Broadcom UPnP stack remote root vulnerability

Recently, DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. Further research revealed that the …

OS X Mountain Lion: The Missing Manual

With more than 200 new features in Mountain Lion, Apple has once again delivered a robust operating system that stays ahead of the curve. This immense book is here to help you …

Events that defined the European information security landscape in 2012

The past 12 months have been, to say the least, an active time for the information security landscape in Europe. Hacktivism stories dominated mainstream media outlets, the …

CEO hot seat: Dave Hansen

Recently SafeNet announced the appointment of Dave Hansen, an information security and cloud veteran, as the company’s new President and CEO. Help Net Security put him …

Investigating clever scamming techniques and their evolution

Christopher Boyd is a Senior Threat Researcher for GFI Software. Chris has been credited for finding the first instance of a rogue Web browser installing without permission, …

What makes a good information security professional?

Information security is a very competitive industry, and one of the very few that kept doing fine even during the recession. It’s also a dynamic field that promises a …

Dangerous remote Linksys 0-day root vulnerability discovered

DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. They contacted Cisco and shared a detailed …

Looking back at a year of Microsoft patches

Last year Microsoft’s Patch Tuesdays featured a total of 83 bulletins, which is a decline from previous years. Since their security efforts impact countless security …

Don't miss

Cybersecurity news