Help Net Security
Fraud study finds MasterCard holding lowest fraud rate
2Checkout released a study of online payments fraud, based on a worldwide sample of approximately one million payment transactions tracked each quarter. Key findings: Discover …
Ineffective password security practices plague organizations
Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, according to Lieberman Software. …
Data brokers collect info on nearly every U.S. consumer
In a report issued on the data broker industry, the Federal Trade Commission finds that data brokers operate with a fundamental lack of transparency. The Commission recommends …
The cloud will transform the airport experience
Airports are increasingly identifying the need to switch to cloud systems in order to improve operational efficiencies, according to Amadeus, who collected the viewpoints of …
Large increase in PayPal-related phishing URLs
CYREN published its April 2014 Internet Threats Trend Report. Among its findings, they revealed a 73 percent increase in the number of phishing attacks aimed at PayPal users. …
Instant messaging Trojan spreads through the UK
Hundreds of computer systems have been infected with the latest instant messaging Trojan. Bitdefender has spotted an increasing wave of infections in the past week in …
Operation takes down crime network affecting European electronic payments
Bulgarian and French judicial and law enforcement authorities, working in close cooperation with the European Cybercrime Centre (EC3) at Europol and Eurojust in The Hague, …
Small businesses and the cloud: How to mitigate the risks
Security concerns are still preventing many small businesses from using new technology methods to accelerate growth. The cloud is one major example of a “hot …
Week in review: eBay breach, Linux Trojans, US charges Chinese military hackers for spying on US firms
Here’s an overview of some of last week’s most interesting news, podcasts, and articles: Record month for Linux Trojans If you think that you are protected from …
Netwrix extends auditing visibility into SharePoint changes
SharePoint has become a popular business application for storing data, sharing content and powering websites. For many organizations, it is the core of their collaboration …
DDoS attacks: Criminals get stealthier
There is a lot of media hype surrounding volumetric style DDoS attacks recently where the focus has been on large Gb/sec attacks, sometimes up to 400 Gb/sec. In reality, these …
What is the key to IT program management?
The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE