Security News

The multiple benefits of IT auditing (Help Net Security)
2015-03-27 08:06

Regulatory compliance requirements provide instructions for organizations on how to protect the data of their employees, business operations, and customers that are stored on their servers. The proces...

Amazon Cloud Drive now with unlimited cloud storage (Help Net Security)
2015-03-27 08:04

Amazon announced unlimited cloud storage with Amazon Cloud Drive—two new storage plans for customers to securely store their existing content collections and automatically upload endless amounts of ne...

Apple-themed "Your account has been limited" phishing emails doing rounds (Help Net Security)
2015-03-26 15:07

Apple users are once again targeted with phishing emails, warns Bitdefender, and the latest variant of the scheme is impersonating Apple Support claiming that their account has been "limited." The ...

New Zealand's XKEYSCORE Use (Schneier on Security)
2015-03-26 14:46

The Intercept and the New Zealand Herald have reported that New Zealand spied on communications about the World Trade Organization director-general candidates. I'm not sure why this is news; it...

Xtube visitors redirected to exploit kit landing page (Help Net Security)
2015-03-26 13:51

Popular adult site Xtube has been compromised to redirect visitors to sites hosting an exploit kit. "Unlike other attacks we have seen in recent times, this one does not use malicious ads (malverti...

How companies secure their cloud data (Help Net Security)
2015-03-26 13:43

As companies accelerate their adoption of the cloud, the cloud data footprint is expected to grow to 6.5 zettabytes by 2018. This rapid migration of data into the cloud creates the need for insight in...

Behavioral biometrics: The password you can’t forget (Help Net Security)
2015-03-26 12:28

This year’s Mobile World Congress featured more biometrics technology than ever before, with the launch of Google’s Android Pay and Samsung Pay both unveiling technology that enables payments through ...

Huge spam operation on Twitter uncovered (Help Net Security)
2015-03-26 10:39

What does it take to execute a successful spam operation peddling diet pills of questionable effectiveness? For one spammer, it took some 750,000 fake Twitter accounts. Symantec researchers first s...

Review:  Build A Security Culture (Help Net Security)
2015-03-26 09:11

Author: Kai Roer Pages: 124 Publisher: IT Governance Publishing ISBN: 1849287163 Introduction Kai Roer is one of the creators of the Security Culture Toolkit, a well-regarded framework th...

Banks and IT security: The elements of success (Help Net Security)
2015-03-26 08:49

In this interview, Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank, discusses how data breaches ...