Security News

Cloud-based vulnerability management: Top vendors in the field (Help Net Security)
2015-10-26 09:15

With an increasingly fast-paced threat landscape threatening even the most complex network security infrastructures, vulnerability management has become essential. Many vendors are offering cloud-b...

What should companies do after a wide-scale data breach? (Help Net Security)
2015-10-26 08:00

It is not always possible to prevent such attacks, however, it is possible to make them highly unlikely to succeed. It is also possible to limit the extent of possible damage that any given successful...

Nine arrested in UK investigation of criminal network defrauding bank customers (Help Net Security)
2015-10-26 07:00

Detectives investigating an organized criminal network responsible for defrauding bank customers across the UK out of approximately £60 million have arrested nine people. On Wednesday, 21 Octo...

Week in review: Criminals hacked chip-and-PIN system, secret code in printers allows tracking, and insecure WD self-encrypting hard drives (Help Net Security)
2015-10-26 06:42

Here's an overview of some of last week's most interesting news and articles: Criminals hacked chip-and-PIN system by perfecting researchers' PoC attack When in 2010 a team of computer scientist...