Articles
  • The invasion of biometrics

    Biometrics as a means of unique identification is common place today and it’s going to be even more so as tomorrow becomes today. But how would you feel about having your DNA mapped and your network of veins and capillaries used to identify you? It might sound far-fetched but not as far as you think – Steve Bell, Security Expert at BullGuard takes a look at what the future may hold.

  • The ticking cybersecurity risk: Managing wearable tech in the workplace

    Smartphones and tablets took time to effectively crossover from consumer device to business staple. Wearables, despite still being the infants of IT hardware, are already starting to make that leap.

  • How can organizations adapt to the rise in data breaches?

    There’s more money currently dedicated to stopping data breaches than ever before; however, this money isn’t always being sent in the right direction to truly put a stop to the problem.

  • Five misunderstandings about cloud storage

    Cloud storage is a solution that users are driving IT organizations to use whether we want to or not. Just ask a sales person what they use. They will tell you how great it is and how they use it. As IT organizations, we need to take notice and understand the impact to our process and the effect to the data stored outside of our organization. Here are five things commonly misunderstood about cloud storage.

  • The need for end-user visibility in a Bring Your Own Anything environment

    Mobiles, tablets, PCs, applications, cloud services - employees are increasingly bringing non-company devices into their organizations and connecting them to everything they need to do their jobs. As this phenomenon clearly goes way beyond devices alone, I’d suggest that the oft-used acronym BYOD is no longer sufficient, and should perhaps be replaced with BYO* - bring your own anything and everything.

  • How to protect from threats against USB enabled devices

    USB can be an effective and simple route to infection. Take a thumb drive for example. It is child’s play to load malware on one and a disgruntled employee could easily do so to infect an organization for unfair treatment. There is also malware that specifically targets USB devices and can spread when they are plugged into other machines. A more common infection route may be the inadvertent installation of a virus onto the drive from already infected files, similar to when floppies spread viruses, then CDs and later on DVDs. The problem is that there is a wide range of USB devices which can harbor these kind of nasties – from USB hard drives to smartphones to even the seemingly innocent iPod.

  • Boards must up their game before the hackers claim checkmate

    In today’s climate, the cyber security paradigm is a reactive cycle. When a threat is uncovered, it is examined and a counter-measure is created, with response times varying from weeks to years.

    The problem is that attackers have the ability to quite easily reuse the previous pieces of malware, modify them and then build a brand new threat, therefore bypassing the new and updated security measures. Effectively, the connected world is under siege and current security solutions and approaches are outdated and inadequate.

  • How vulnerable is our critical national infrastructure?

    Considered the backbone of the nation’s economy, security and health; critical infrastructure provides power, water, transportation, and communications systems relied on to connect us with our friends and family to our communities. Utility, oil and gas, manufacturing and alternative energy organizations are fending off cyber attacks on a daily basis. From activist groups to state-sponsored hackers, our nations’ critical infrastructures are targeted regularly in an attempt to disrupt services and cause havoc.

  • I don’t need friends, I have followers

    Admittedly, I didn’t really mean to utter those words but found them coming out of my mouth nonetheless. Well what else do you say when an eight year old ridicules you because they have more friends? In my defense, the response was never truly serious, and was born out of the research for the next book titled “The (un)social network.”

  • Look where you're going before backing up

    In 2011 a group of well-meaning Reddit users set out on a mission to encourage consumers and businesses to ‘take the pledge’ and backup their important files to avoid April Foolishness. The annual marker is a good reminder to everyone who stores digital files that we’re never more than a click, virus or spilled cup of coffee away from losing the things dearest to us. Devices may also get lost, stolen, or damaged. Even if this doesn't happen, your current storage device may fail unexpectedly.

Videos      Podcasts



Spotlight

Banking botnets persist despite takedowns

More than 90 percent of all Trojans targeted financial institutions located in US, followed by the UK, Germany, Italy, Spain and Australia.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Apr 27th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //