Tech giants back initiative for funding crucial open source projects

Posted on 24 April 2014.  |  The nonprofit Linux Foundation has announced the Core Infrastructure Initiative, a multi-million dollar project aimed to fund open source projects.

NIST drops NSA-backed algorithm from encryption recommendations

Posted on 23 April 2014.  |  NIST has removed a cryptographic algorithm from its draft guidance on random number generators.

A guide to cloud encryption and tokenization

Posted on article.php?id=1995  |  In order to achieve the best cloud information protection strategy, enterprises must understand what information they use to run their enterprise and what sensitive data should needs protection in the cloud.

Supposedly patched router backdoor was simply hidden

Posted on 22 April 2014.  |  Companies have pushed out a new version of the firmware that to close the backdoor. Only it didn't - it only hid it.

3M payment cards compromised in Michaels Stores/Aaron Brothers breach

Posted on 18 April 2014.  |  The impact is huge: approximately 3 million payment cards were potentially compromised.

Spotlight

Nine patterns make up 92 percent of security incidents

Posted on 23 April 2014.  |  Researchers have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack patterns that vary from industry to industry.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 24th
Events
Infosecurity Europe 2014
29 April - 01 May 2014.
HITBSecConf2014 Amsterdam
29 May - 30 May 2014.

Editor's choice

Learning from others

23 April 2014. | The old saying “one man’s misfortune is another man’s gain” is eminently applicable in the information security industry.

Dissecting the unpredictable DDoS landscape

23 April 2014. | DDoS attacks are now more unpredictable and damaging than ever, crippling websites, shutting down operations, and costing millions of dollars in downtime, customer support and brand damage.

A guide to cloud encryption and tokenization

22 April 2014. | In order to achieve the best cloud information protection strategy, enterprises must understand what information they use to run their enterprise and what sensitive data should needs protection in the cloud.

How can we create a culture of secure behavior?

22 April 2014. | Phishing is not the only issue organizations face: malware attacks, physical attacks on company data by workers posing as service personnel, and attacks aimed specifically at mobile devices are on the rise, are just a few examples of the many threat vectors.

Organizations remain vulnerable to SQL injection attacks

18 April 2014. | A new study found that 65 percent of respondents had experienced SQL injection attacks that successfully evaded their perimeter defenses in the past 12 months.

The dismal state of SATCOM security

17 April 2014. | The list of security weaknesses found in the firmware used on the most widely deployed Inmarsat and Iridium SATCOM terminals is huge.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //