Security News

Weak SSH keys opened many GitHub repositories to compromise (Help Net Security)
2015-06-03 10:37

Github repositories of many entities, projects, and even one government could have been compromised and used to deliver malicious code due to the owners' use of easily crackable SSH keys. "A little...

Rapid7 brings its advisory services to EMEA, introduces threat modeling (Help Net Security)
2015-06-03 09:09

At Infosecurity Europe 2015 Rapid7 announced it will offer its Strategic Advisory Services in EMEA to help security executives and teams solve pressing cyber security challenges. The practice, which l...

Endpoint Protector gets integration with cloud storage apps (Help Net Security)
2015-06-03 08:56

At Infosecurity Europe 2015, CoSoSys announced the development of Endpoint Protector 4 to include new integrations with Dropbox for Business and Box to strengthen data security policies and prevent da...

Billions of email messages attributed to brands potentially fraudulent (Help Net Security)
2015-06-03 07:04

Data solutions provider Return Path announced that nearly 21 billion emails attributed to a large group of global consumer brands sent between October 2014 and March 2015 did not come from IP addresse...

CipherCloud offers compliance advice regarding EU privacy laws (Help Net Security)
2015-06-03 06:59

As the EU moves towards stricter data privacy rules, companies operating in the region are grappling with translating legal policy into business practices. In light of this transition, CipherCloud has...

Infosecurity Europe 2015, expo floor, part two (Help Net Security)
2015-06-03 06:57

Infosecurity Europe 2015 is underway in London, and infosec companies, experts and customers are crowding the expo floor. For up-to-date conference news check out our dedicated coverage page for I...

IoT devices entering enterprises, opening company networks to attacks (Help Net Security)
2015-06-03 06:56

OpenDNS released The 2015 Internet of Things in the Enterprise Report, a worldwide data-driven security assessment of Internet of Things (IoT) devices and infrastructure found in businesses. Using...