Help Net Security
Hacking RFID payment cards made possible with Android app
We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the …
Scammers used fake product listings to steal from Walmart
On November 13, US retailer Walmart announced that they will officially start matching the price for items which are also sold for a lower price by online retailers. Less than …
Tips to avoid online scammers this holiday season
With Black Friday and Cyber Monday offers, often dramatically cutting prices for one day only, there will be many genuine deals to be had. The problem for many of us is how to …
Black Friday and Cyber Monday will put retailers under pressure
Retailers are currently preparing themselves for two very busy shopping days. Black Friday (28th November 2014) and Cyber Monday (1st December 2014) will see shoppers spend …
ENISA guidelines on cryptographic solutions
ENISA published two reports. “Algorithms, key size and parameters” is a reference document providing a set of guidelines to decision makers, in particular …
Week in review: Critical WP bug allows site hijacking, WhatsApp gets end-to-end encryption
Here’s an overview of some of last week’s most interesting news and articles: The evolution of threat detection and Big Data Mark Gazit is the CEO of ThetaRay, a …
Examining 1 billion transactions for fraud
ThreatMetrix analyzed nearly one billion transactions and is able to provide a representative summary of activity including account creation, payment and login fraud across …
Users of Remote Access Trojans arrested in Europe
Europol and several law enforcement and judicial authorities carried out an action against EU citizens, mainly teenagers and young adults, who are suspected of using remote …
User behavior intelligence in the expanding supply chain
The Internet has dramatically increased the speed of commerce across the globe. Today, the interconnectedness of various businesses facilitates just-in-time manufacturing, …
ITIL and ISO 20000 problem management
Remember this situation? You’re running Windows. The blue screen forces you to reboot your PC. And then it happens again. Incident Management = reboot your PC. And your …
Using company devices for personal activities leads to data loss
GFI Software released the findings of an independent study into how workers use company provided computers and laptops for personal activities, and the direct impact that …
6 tips for protecting your Internet-connected devices
While Internet-connected devices are our window on the world, we don’t realize that for cybercriminals it could be their window into ours if we don’t secure our …
Featured news
Resources
Don't miss
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management
- Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)