Security pros don't know the number of cloud apps in their networks

Posted on 19 September 2014.  |  There's a significant difference between the number of cloud-based applications IT and security professionals believe to be running in their environments, and the number reported by cloud application vendors.

Security compliance is necessary for real-time mobile data access

Posted on 18 September 2014.  |  Mobile is fundamentally different than other enterprise technology and therefore requires a revised approach to security policies and countermeasures.

Tinba Trojan targets major US banks

Posted on 17 September 2014.  |  Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back.

XSS bug allows Amazon account hijacking

Posted on 16 September 2014.  |  A recurring XSS bug in Amazon's Kindle Library, i.e. the "Manage your Kindle" web application, can be exploited by attackers.

How a large ISP fights DDoS attacks with a custom solution

Posted on 10 September 2014.  |  How do the big guys tackle these attacks? What weapons can an ISP bring to the battleground?

Spotlight

How to talk infosec with kids

Posted on 17 September 2014.  |  It's never too early to talk infosec with kids: you simply need the right story. In fact, as cyber professionals itís our duty to teach ALL the kids in our life about technology. If we are to make an impact, we must remember that children needed to be taught about technology on their terms.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
Events
Cyber Security EXPO 2014
08 October - 09 October 2014.
McAfee FOCUS 14
27 October - 29 October 2014.

Editor's choice

How to keep your contactless payments secure

19 September 2014. | Here are the top security threats you should be aware of if youíre using a RF-based card, along with our top safety tips to keep your payments secure.

With iOS 8, Apple won't be able to unlock phones for the police

18 September 2014. | With the release of iOS 8, Apple has also updated its Privacy Policy.

How to talk infosec with kids

17 September 2014. | It's never too early to talk infosec with kids: you simply need the right story.

XSS bug allows Amazon account hijacking

16 September 2014. | A recurring XSS bug in Amazon's Kindle Library, i.e. the "Manage your Kindle" web application, can be exploited by attackers.

Emerging cloud threats and how to address them

15 September 2014. | Public and community clouds can be appealing targets for hackers looking to disrupt or steal information from scores of organizations with one successful strike.

Using thermal imaging for security

11 September 2014. | Do you work in counter surveillance or physical penetration testing? The physical security field in general? If yes, have you considered using a thermal imaging camera to help you in your work?

How a large ISP fights DDoS attacks with a custom solution

10 September 2014. | What weapons can an ISP bring to the battleground?


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //