Reviews
  • Information Security Analytics

    | by Zeljka Zorz - Thursday, 8 January 2014.

    We've all heard about Big Data and security analytics as solutions to a variety of information security problems. This book explains what they are, how they work, and the value they can bring to businesses.

  • Detecting and Combating Malicious Email

    | by Zeljka Zorz - Monday, 5 January 2014.

    After years and years of security professionals explaining the dangers of malicious electronic messaging and how to avoid them, cyber crooks are still using them to compromise systems, meaning this method still works.

    This book takes a stab at spelling out clearly, in a plain language that even users with modest technical knowledge can understand, how to avoid becoming a victim of malicious messaging (emails, but also text messages, social media postings, etc.).

  • Python Forensics

    | by Matt Erasmus - Thursday, 18 December 2014.

    This book was touted as a "no-nonsense resource for the rapid development of new Python-based digital forensic applications." Given my deep love for Python and an interest in digital forensics, I had high hopes.

  • CSA Guide to Cloud Computing

    | by Zeljka Zorz - Wednesday, 10 December 2014.

    The title says it all: this is a book that will tell you what cloud computing is, how best to take advantage of it, and what things you should be careful about when you do it.

  • Secure file storage and sharing with nCrypted Cloud

    | by Berislav Kucan - Thursday, 20 November 2014.

    The Ponemon Institute recently published a report stressing the fact that organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees. nCrypted Cloud is an interesting offering that tackles this and other threats by adding a strong security layer to the data used and shared via popular cloud-based data storage providers.




Spotlight

Compromised cPanel "Account Suspended" pages redirect to exploit kit

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Feb 27th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //