Security News

The Economist urges readers to check it they were saddled with malware (Help Net Security)
2015-11-09 12:38

Popular UK-based news outfit The Economist - or rather, some of its online readers - have become the latest confirmed victims of an attack executed by hacking anti-adblocking service PageFair. "If ...

Stolen or lost devices and the risks of remote working (Help Net Security)
2015-11-09 11:38

44 percent of organizations believe a member of their senior management has lost a mobile device in the last year, whilst 39 percent say senior management had a device stolen. Vanson Bourne conduct...

Cox Communications to pay $595,000 for data breach (Help Net Security)
2015-11-09 11:24

The Federal Communications Commission’s Enforcement Bureau has entered into a $595,000 settlement with Cox Communications to resolve an investigation into whether the company failed to properly protec...

Final TalkTalk breach tally: 4% of customers affected (Help Net Security)
2015-11-09 09:03

TalkTalk continues with its practice of updating the public with information regarding the recent data breach on Fridays, and according to the latest update, the total number of customers whose person...

Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare (Help Net Security)
2015-11-09 08:24

When is an IP address not actually the person, country of origin or device you thought? From Klingons, to Harry Potter, to Xbox Halo’s Master Chief, the world has dreamt up scores of science fiction s...

The transformative technology security nightmare (Help Net Security)
2015-11-09 07:13

They say that every silver lining comes with a cloud attached and that’s certainly true of today’s transformative technologies. CEOs and the board rightly see BYOD, Cloud and IoT initiatives as a gate...

Guide to application whitelisting (Help Net Security)
2015-11-09 07:10

The National Institute of Standards and Technology (NIST) has published a guide to deploying automated application whitelisting to help thwart malicious software from gaining access to organizations’ ...