Articles
  • Modern IRM: Securing the future of work

    In an open, collaborative enterprise, the best way to protect confidential data and mitigate the risk of data loss is to adapt IRM to match modern tools and platforms.

  • Your board and cyber risk: Reimagining security protocols from the top down

    As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the industry — registered broker-dealers and investment advisers — who according to public reports, continue to face cybersecurity breaches related to weaknesses in basic controls.

  • Android users on high alert as malware, phishing and scams are projected to rise

    Android phones are popular and growing more so every day. According to research firm IDC, there were close to 350 million active smartphones worldwide in the second quarter of 2015, and approximately 80 percent of them ran on the Android platform. That leaves about 280 million open sourced Android devices owned by 3.5 percent of the world’s total population exposed to a barrage of vulnerabilities, including malware attacks, fake apps, Malvertising, phishing scams and more.

  • The history of cyber attacks: From ancient to modern

    In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a firewall implemented between their internal network and the Internet. As time passed, the focus started shifting, and cyber-attacks evolved into a profitable business for cybercriminals. As we are now living in the world we once thought of as the distant future, we are witnessing sophisticated and targeted attacks against many organizations.

  • There's no turning back: Say goodbye to the perimeter

    If you’ve been following the announcements from this year’s Consumer Electronics Show is Las Vegas, you couldn’t have missed Ford’s partnership announcement with Amazon.

    Fifteen years ago, who would have foreseen a strategic partnership between what was then essentially an online book seller and a traditional Detroit car manufacturer? Yet, the catalyst of technology innovation changes so many things that being surprised is almost a constant state.

  • Why we need a reality check on passwords

    Given all the recent and historical news on data breaches of personal e-mail accounts, social media accounts and even phone account passwords, it is every wonder therefore that we are still using password combinations that are incredibly easy to guess.

  • Oracle fixes 248 vulnerabilities in January patch update

    Oracle has published their Critical Patch Update (CPU) for January 2016. The Oracle CPU is quarterly and addresses the flaws in large Oracle’s product line, including their core product the relational database, but also in a large number of acquisitions like Solaris, MySQL, Java and many of the end-user products, such as JDEdwards ERP, Peoplesoft and CRM.

  • How email in transit can be intercepted using DNS hijacking

    This article looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack.

    While our research on the state of email delivery security indicates that this attack is less pervasive than the TLS downgrade attack, it is equally effective at defeating email in-transit encryption. This article explains how this attack works, how it can be mitigated and to what extent it also affects the security of a website.

  • Endpoint security really can improve user experience

    Traditional security policies are intrusive and impact user productivity. This is unfortunately the opinion of most end users. In fact, according to a recent study performed by Dimensional Research: The Value of a Great Desktop Experience, as many as 62% of business users identified security that is not intrusive as an important factor to a great desktop user experience.

  • Have I been hacked? The indicators that suggest you have

    Security professionals are constantly on the hunt for potential vulnerabilities and looking for ways to defend their networks. The term “indicator of compromise” (IOC) – first coined by governments and defense contractors trying to identify advanced persistent threats (APTs) – is something that all information security experts are familiar with.

Videos      Podcasts



Spotlight

Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Feb 4th
    COPYRIGHT 1998-2016 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //