0-days found in Symantec Endpoint Protection

Posted on 30 July 2014.  |  Researchers have unearthed three privilege escalation zero-day bugs affecting Symantec Endpoint Protection.

Layered security in the cloud

Posted on 29 July 2014.  |  By combining the tools supplied by a cloud provider with external third party solutions, higher levels of security - not to mention peace of mind - are achieved.

I2P patched against de-anonymizing 0-day, Tails integration still to follow

Posted on 29 July 2014.  |  Developers of the I2P anonymous networking tool have released a new version of the tool that fixes XSS and remote execution vulnerabilities.

Russian government offers money for Tor-cracking tech

Posted on 28 July 2014.  |  The Russian Ministry of Internal Affairs is offering $111,000 to any Russian company that can de-anonymize users of Tor.

9 tips for communicating your BYOD policy

Posted on 28 July 2014.  |  If an IT department creates a BYOD policy and no one at the company knows about it, does it actually make an impact?

Spotlight

Using Hollywood to improve your security program

Posted on 29 July 2014.  |  Tripwire CTO Dwayne Melancon spends a lot of time on airplanes, and ends up watching a lot of movies. Some of his favorite movies are adventures, spy stuff, and cunning heist movies. A lot of these movies provide great lessons that we can apply to information security.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 30th
Events
Black Hat USA 2014
02 August - 07 August 2014.
PasswordsCon 2014 Las Vegas
05 August - 06 August 2014.
Cyber Security EXPO 2014
08 October - 09 October 2014.

Editor's choice

Using Hollywood to improve your security program

29 July 2014. | A lot of heist movies provide great lessons that we can apply to information security.

Layered security in the cloud

29 July 2014. | By combining the tools supplied by a cloud provider with external third party solutions, higher levels of security - not to mention peace of mind - are achieved.

Android Fake ID bug allows malware to impersonate trusted apps

29 July 2014. | The Bluebox Security research team has unearthed another critical Android vulnerability.

9 tips for communicating your BYOD policy

28 July 2014. | If an IT department creates a BYOD policy and no one at the company knows about it, does it actually make an impact?

Almost 1 in 10 Android apps are now malware

28 July 2014. | Cheetah Mobile Threat Research Labs analyzed 24.4 million sample files. Of those, 2.2 million files had viruses. This is a 153% increase from the number of infected files in 2013.

The evolution of backup and disaster recovery

25 July 2014. | Amanda Strassle, IT Senior Director of Data Center Service Delivery at Seagate Technology, talks about enterprise backup issues, illustrates how the cloud shaping an IT department's approach to backup and disaster recovery, and more.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //