Help Net Security
What can we learn from the top 10 biggest data breaches?
You can’t blink these days without hearing about yet another data breach. While some may be suffering from “breach fatigue” and becoming jaded, we argue that …
NIST vetting guide helps in testing mobile apps
While many mobile device apps such as a calendar or collaboration tools are very handy and can improve productivity, they can also introduce vulnerabilities that can put …
Crooks trying out new tactics to spread fake AV
Infection numbers of well-established fake AV families have reached the lowest level in years, and Microsoft researchers believe the drop is the result of the antimalware …
Machete cyber espionage campaign targeting Latin America
Kaspersky Lab discovered a new cyber-espionage campaign code-named Machete. This campaign has been targeting high profile victims, including government, military, law …
Mobile device security: Tackling the risks
Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a …
Infographic: How secure is Bitcoin?
The security of Bitcoin transactions is one of the main drawbacks of the digital currency. The infographic below takes a look at what you need to know to stay vigilant. Click …
51% of consumers share passwords
Consumers are inadvertently leaving back doors open to attackers as they share log in details and sign up for automatic log on to mobile apps and services, according to new …
Reactions to the massive breach at Community Health Systems
Community Health Systems, a major group that operates 206 hospitals throughout the US, has suffered a massive data breach: personal information of some 4.5 million patients …
Successful strategies to avoid frequent password changes
1.2 billion passwords reportedly stolen by Russian hackers. Before that it was Heartbleed. After a widespread, nonspecific data breach, the conventional wisdom is that people …
Infographic: Major security skills shortages
Cyber attacks are getting more advanced and hackers are getting smarter, yet businesses are facing major security skills shortages. The cost of breaches is thought to have …
Research unveils improved method to let computers know you are human
CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the …
ReversingLabs extracts malicious files from network traffic
ReversingLabs announced the N1000 Network File Threat Sensor appliance that employs Active Decomposition and Predictive Detection technologies to detect threats in files …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down