Number of malicious eBay listings rises, accounts are hijacked

Posted on 22 September 2014.  |  Pressure is mounting against eBay to quickly detect and remove bogus listings triggering cross-site scripting flaws.

Users trust mobile service providers more than employers

Posted on 22 September 2014.  |  Privacy from employers is the top concern for employees being asked to use their own devices for work purposes.

Microsoft kills off its Trustworthy Computing Group

Posted on 19 September 2014.  |  Microsoft's Trustworthy Computing Group is headed for the axe.

Security pros don't know the number of cloud apps in their networks

Posted on 19 September 2014.  |  There's a significant difference between the number of cloud-based applications IT and security professionals believe to be running in their environments, and the number reported by cloud application vendors.

Security compliance is necessary for real-time mobile data access

Posted on 18 September 2014.  |  Mobile is fundamentally different than other enterprise technology and therefore requires a revised approach to security policies and countermeasures.

Spotlight

Behavioral analysis and information security

Posted on 22 September 2014.  |  In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security and how behavioral analysis can influence the evolution of security technologies.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 23rd
Events
Cyber Security EXPO 2014
08 October - 09 October 2014.
McAfee FOCUS 14
27 October - 29 October 2014.

Editor's choice

Behavioral analysis and information security

22 September 2014. | Kevin Watkins, Chief Architect at Appthority, talks about how behavioral analysis can influence the evolution of security technologies.

How to keep your contactless payments secure

19 September 2014. | Here are the top security threats you should be aware of if youíre using a RF-based card, along with our top safety tips to keep your payments secure.

With iOS 8, Apple won't be able to unlock phones for the police

18 September 2014. | With the release of iOS 8, Apple has also updated its Privacy Policy.

How to talk infosec with kids

17 September 2014. | It's never too early to talk infosec with kids: you simply need the right story.

Emerging cloud threats and how to address them

15 September 2014. | Public and community clouds can be appealing targets for hackers looking to disrupt or steal information from scores of organizations with one successful strike.

Using thermal imaging for security

11 September 2014. | Do you work in counter surveillance or physical penetration testing? The physical security field in general? If yes, have you considered using a thermal imaging camera to help you in your work?

How a large ISP fights DDoS attacks with a custom solution

10 September 2014. | What weapons can an ISP bring to the battleground?


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //