Users trust mobile service providers more than employers

Posted on 22 September 2014.  |  Privacy from employers is the top concern for employees being asked to use their own devices for work purposes.

Microsoft kills off its Trustworthy Computing Group

Posted on 19 September 2014.  |  Microsoft's Trustworthy Computing Group is headed for the axe.

Security pros don't know the number of cloud apps in their networks

Posted on 19 September 2014.  |  There's a significant difference between the number of cloud-based applications IT and security professionals believe to be running in their environments, and the number reported by cloud application vendors.

Security compliance is necessary for real-time mobile data access

Posted on 18 September 2014.  |  Mobile is fundamentally different than other enterprise technology and therefore requires a revised approach to security policies and countermeasures.

Tinba Trojan targets major US banks

Posted on 17 September 2014.  |  Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back.

Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victimís financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if youíre using a RF-based card, along with our top safety tips to keep your payments secure.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
Events
Cyber Security EXPO 2014
08 October - 09 October 2014.
McAfee FOCUS 14
27 October - 29 October 2014.

Editor's choice

How to keep your contactless payments secure

19 September 2014. | Here are the top security threats you should be aware of if youíre using a RF-based card, along with our top safety tips to keep your payments secure.

With iOS 8, Apple won't be able to unlock phones for the police

18 September 2014. | With the release of iOS 8, Apple has also updated its Privacy Policy.

How to talk infosec with kids

17 September 2014. | It's never too early to talk infosec with kids: you simply need the right story.

XSS bug allows Amazon account hijacking

16 September 2014. | A recurring XSS bug in Amazon's Kindle Library, i.e. the "Manage your Kindle" web application, can be exploited by attackers.

Emerging cloud threats and how to address them

15 September 2014. | Public and community clouds can be appealing targets for hackers looking to disrupt or steal information from scores of organizations with one successful strike.

Using thermal imaging for security

11 September 2014. | Do you work in counter surveillance or physical penetration testing? The physical security field in general? If yes, have you considered using a thermal imaging camera to help you in your work?

How a large ISP fights DDoS attacks with a custom solution

10 September 2014. | What weapons can an ISP bring to the battleground?


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //