NIST drops NSA-backed algorithm from encryption recommendations

Posted on 23 April 2014.  |  NIST has removed a cryptographic algorithm from its draft guidance on random number generators.

A guide to cloud encryption and tokenization

Posted on article.php?id=1995  |  In order to achieve the best cloud information protection strategy, enterprises must understand what information they use to run their enterprise and what sensitive data should needs protection in the cloud.

Supposedly patched router backdoor was simply hidden

Posted on 22 April 2014.  |  Companies have pushed out a new version of the firmware that to close the backdoor. Only it didn't - it only hid it.

3M payment cards compromised in Michaels Stores/Aaron Brothers breach

Posted on 18 April 2014.  |  The impact is huge: approximately 3 million payment cards were potentially compromised.

SharePoint users are breaching security policies

Posted on 17 April 2014.  |  At least 36% of SharePoint users are breaching security policies, and gaining access to sensitive and confidential information to which they are not entitled.

Spotlight

Dissecting the unpredictable DDoS landscape

Posted on 23 April 2014.  |  DDoS attacks are now more unpredictable and damaging than ever, crippling websites, shutting down operations, and costing millions of dollars in downtime, customer support and brand damage, according to Neustar.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Apr 23rd
Events
Infosecurity Europe 2014
29 April - 01 May 2014.
HITBSecConf2014 Amsterdam
29 May - 30 May 2014.

Editor's choice

A guide to cloud encryption and tokenization

22 April 2014. | In order to achieve the best cloud information protection strategy, enterprises must understand what information they use to run their enterprise and what sensitive data should needs protection in the cloud.

How can we create a culture of secure behavior?

22 April 2014. | Phishing is not the only issue organizations face: malware attacks, physical attacks on company data by workers posing as service personnel, and attacks aimed specifically at mobile devices are on the rise, are just a few examples of the many threat vectors.

Organizations remain vulnerable to SQL injection attacks

18 April 2014. | A new study found that 65 percent of respondents had experienced SQL injection attacks that successfully evaded their perimeter defenses in the past 12 months.

The dismal state of SATCOM security

17 April 2014. | The list of security weaknesses found in the firmware used on the most widely deployed Inmarsat and Iridium SATCOM terminals is huge.

The security of the most popular programming languages

15 April 2014. | A new report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more.

Identifying security innovation strategies

14 April 2014. | In this interview, Tom Quillin, the Director of Cyber Security Technology and Initiatives at Intel, talks about security innovation, current and future threats.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //