Data lurking: How to protect your company against overlooked insider threats

More often than not, data breaches come from employees or system errors, not outsiders.

Huge spam operation on Twitter uncovered

What does it take to execute a successful spam operation peddling diet pills of questionable effectiveness? For one spammer, it took some 750,000 fake Twitter accounts.

Half of all Android devices vulnerable to installer hijacking attacks

A critical Android vulnerability can be exploited by attackers to trick users into downloading malicious apps from third-party stores.

Hack air-gapped computers using heat

Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.

Premera breach: Are HIPAA standards too low?

Premera has been deemed compliant with the Health Insurance Portability and Accountability Act (HIPAA) in late November 2014.

Spotlight

Banks and IT security: The elements of success

Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Mar 27th
Events
RSA Conference 2015
20 April - 24 April 2015.
INTERPOL World 2015
14 April - 16 April 2015.
HITBSecConf2015 Amsterdam
26 May - 29 May 2015.

Editor's choice

Banks and IT security: The elements of success

Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank.

Review: Build A Security Culture

Learn more about a structured approach to building and maintaining good security culture within your organization.

Hack air-gapped computers using heat

Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.

Four advantages of an identity behavior-based approach to cybersecurity

More and more companies are falling into the trap of buying a next-gen security system that still relies on today’s ineffective firewall, IPS, malware sandboxing system and SIEM processes and technologies.

Protecting the critical infrastructure: Strategies, challenges and regulation

Learn more in this interview with Raj Samani, VP and CTO EMEA at Intel Security.

Why you shouldn't ignore change auditing

Rupesh Kumar is the Director of Lepide Software. In this interview, he discusses the benefits of change auditing.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //