Security News

Snapchat blocks third-party apps from accessing its APIs (Help Net Security)
2015-04-07 10:44

Snapchat has had its fair share of data breaches and security troubles, the latest of which stemmed from the fact that the app's internal API has been reverse-engineered and is used by a number of thi...

Cyber crooks go after enterprise millions with Dyre malware, social engineering (Help Net Security)
2015-04-07 08:44

"An experienced and resource-backed cybercrime gang" is using the relatively new Dyre/Dyreza banking Trojan coupled with effective social engineering to steal millions from businesses, IBM Security In...

What happens to data after a breach? (Help Net Security)
2015-04-07 08:32

Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, landing in five different conti...

eBook: The shortcut guide to network management (Help Net Security)
2015-04-07 07:14

This eBook outlines real-world technologies and processes to implement centralized management and monitoring of your network infrastructure. Download the first chapter now which covers FCAPS, N...

How to protect from threats against USB enabled devices (Help Net Security)
2015-04-07 06:51

Reports have been circulating that e-cigarette chargers from China were corrupted and infected machines with malware. Many journalists took the story at face value, even though the only source was a s...

Week in review: Security tips for DevOps, and how security pros deal with cybercrime extortion (Help Net Security)
2015-04-07 05:00

Here's an overview of some of last week's most interesting news, reviews and articles: 10 practical security tips for DevOps More organizations are embracing DevOps and automation to realize com...