How Linux Foundation sysadmins secure their workstations

Sysadmins around the world have been provided with another helpful guide on how to go about hardening their Linux workstations.

CPU hardware performance counters for security

Nishad Herath, Principal Anti-Malware Technologist at Qualys, talks about CPU hardware performance counters.

Who's afraid of shadow IT?

The shadow IT movement is here, and it isn’t going anywhere any time soon.

81% of healthcare organizations have been compromised

Only half feel that they are adequately prepared in preventing attacks, according to KPMG.

Malvertising campaigns increase 325 percent

Cyphort investigated the practices used by cyber criminals to inject malicious advertisements into legitimate online advertising networks.

Spotlight

Over 225,000 Apple accounts compromised via iOS malware

Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225,000 valid Apple accounts have been compromised.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Sep 1st
Events
(ISC)2 Security Congress
28 September - 01 October 2015.
Cyber Security Europe 2015
07 October - 08 October 2015.
HITB GSEC Singapore
12 October - 16 October 2015.

Editor's choice

Over 225,000 Apple accounts compromised via iOS malware

Researchers from Palo Alto Networks and China-based WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware.

Proactive real-time security intelligence: Moving beyond conventional SIEM

In today’s complex landscape security pros need to move from this reactive model to proactively using this security intelligence to protect their businesses.

Effective security starts with UX

The biggest contributors to security budget spend are the short-term, lower-priority challenges of internal compliance errors and accidental data leaks.

How to get better at web application security

Robert Hansen, VP of WhiteHat Security Labs, offers advice on how to improve web application security practices.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //