SharePoint users are breaching security policies

Posted on 17 April 2014.  |  At least 36% of SharePoint users are breaching security policies, and gaining access to sensitive and confidential information to which they are not entitled.

Security pros actively hiding negative facts from executives

Posted on 16 April 2014.  |  A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff.

Heartbleed threatens mobile users

Posted on 15 April 2014.  |  As time passes, it becomes more and more obvious that almost no-one is safe from the danger created by the existence of the Heartbleed bug.

The security of the most popular programming languages

Posted on 15 April 2014.  |  A new report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more.

Identifying security innovation strategies

Posted on 14 April 2014.  |  Tom Quillin is the Director of Cyber Security Technology and Initiatives at Intel Corporation. In this interview he talks about security innovation, current and future threats.

Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 17th
Events
Infosecurity Europe 2014
29 April - 01 May 2014.
HITBSecConf2014 Amsterdam
29 May - 30 May 2014.

Editor's choice

Oracle patches 104 vulns, still working on some Heartbleed fixes

17 April 2014. | Oracle's April 2014 Critical Patch Update solves a total of 104 vulnerabilities found across many of its products.

Security pros actively hiding negative facts from executives

16 April 2014. | A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff.

The security of the most popular programming languages

15 April 2014. | A new report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more.

Identifying security innovation strategies

14 April 2014. | Tom Quillin is the Director of Cyber Security Technology and Initiatives at Intel Corporation. In this interview he talks about security innovation, current and future threats.

Heartbleed: Private crypto keys can be extracted from vulnerable servers

14 April 2014. | The recently discovered Heartbleed bug can be exploited to obtain private encryption keys from vulnerable websites.

52% of enterprises defenseless against cyber attacks

14 April 2014. | 55% of IT and security professionals have either zero or low visibility of employee behavior, application access and software downloads as they struggle to secure the endpoint.

Securing mobile applications

11 April 2014. | Dan Cornell, Principal of Denim Group, talks about the pitfalls of securing mobile applications.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //