3M payment cards compromised in Michaels Stores/Aaron Brothers breach

Posted on 18 April 2014.  |  The impact is huge: approximately 3 million payment cards were potentially compromised.

SharePoint users are breaching security policies

Posted on 17 April 2014.  |  At least 36% of SharePoint users are breaching security policies, and gaining access to sensitive and confidential information to which they are not entitled.

Security pros actively hiding negative facts from executives

Posted on 16 April 2014.  |  A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff.

The security of the most popular programming languages

Posted on 15 April 2014.  |  A new report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more.

Identifying security innovation strategies

Posted on 14 April 2014.  |  Tom Quillin is the Director of Cyber Security Technology and Initiatives at Intel Corporation. In this interview he talks about security innovation, current and future threats.

Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
Events
Infosecurity Europe 2014
29 April - 01 May 2014.
HITBSecConf2014 Amsterdam
29 May - 30 May 2014.

Editor's choice

Organizations remain vulnerable to SQL injection attacks

18 April 2014. | A new study found that 65 percent of respondents had experienced SQL injection attacks that successfully evaded their perimeter defenses in the past 12 months.

The dismal state of SATCOM security

17 April 2014. | The list of security weaknesses found in the firmware used on the most widely deployed Inmarsat and Iridium SATCOM terminals is huge.

Attackers use reflection techniques for larger DDoS attacks

17 April 2014. | Newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.

Security pros actively hiding negative facts from executives

16 April 2014. | A new study exposes a severe gap in security visibility and perception between C-level executives and IT security staff.

The security of the most popular programming languages

15 April 2014. | A new report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more.

Identifying security innovation strategies

14 April 2014. | In this interview, Tom Quillin, the Director of Cyber Security Technology and Initiatives at Intel, talks about security innovation, current and future threats.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //