| by Zeljka Zorz - Wednesday, 24 July 2013.
If you're looking to learn about cyber warfare, but don't know where to start, you might prefer picking up a book instead of searching for information dispersed on the Internet. Read on to see if this is the right one for you.
| by Mirko Zorz - Wednesday, 10 July 2013.
What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention was to introduce the reader to the core principles and steps of an intrusion investigation. Read on to find out if they succeeded.
| by Zeljka Zorz - Wednesday, 3 July 2013.
It is a truth universally acknowledged that in order to know what company IT assets you should protect and how, you need to first perform a risk assessment. But how do to go about it? This book will tell you everything you need to know and do to perform this feat.
| by Mirko Zorz - Wednesday, 26 June 2013.
Synapsid is an iOS app that promises an encrypted chat experience on Facebook.
In addition to having secure conversations, Synapsid allows you to: view friends profiles, add friends to your contacts, birthday reminders, view and share pictures, view and respond to event invites, and more.
| by Mirko Zorz - Thursday, 20 June 2013.
Apple Configurator is a tool used for the mass configuration of iOS devices. With many large organizations adapting a variety of iOS devices into their daily workflow, it's becoming an essential tool that enables the IT department to quickly deploy those devices. This book explores the capabilities and the limitations of Apple Configurator.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.