Help Net Security
GE acquires Wurldtech to advance cyber security for key industries
GE announced a definitive agreement to acquire privately held Wurldtech, a Vancouver, British Columbia-based company. This move is one of several by GE to help protect …
Week in review: Android locker ransomware, password management done right, IE 0-day exploit details
Here’s an overview of some of last week’s most interesting news, podcasts, interviews, videos and articles: Researchers debunk severity of OAuth “Covert …
Snapchat promises of disappearing messages were false
Snapchat, the developer of a popular mobile messaging app, has agreed to settle Federal Trade Commission charges that it deceived consumers with promises about the …
Microsoft to release eight bulletins on Tuesday
Tuesday, May 13 marks the next Microsoft security patch release. This release will contain eight bulletins, which is the most in a single release so far this year. The good …
Epidemic of unknown malware on enterprise networks
Check Point has issued a report uncovering the major security events that occurred and impacted organizations across the world in 2013. The report is based on analysis of …
Key trends in cloud usage, risks and malware
Skyhigh Networks released the third edition of its quarterly Cloud Adoption and Risk Report. “With this report, we uncovered trends beyond the presence of shadow IT in …
Are rogue employees the biggest threat to information security?
Rogue employees continue to be the biggest threat to information security, according to 37% of IT professionals polled by BSI at Infosecurity Europe 2014. The poll …
Malware peddlers prefer deceptive tactics to exploits
Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …
The prime target for malicious emails
In the first quarter of 2014 spammers started imitating messages from mobile applications. They especially like the popular mobile messengers – WhatsApp, Viber and …
Calling the cloud: Challenges of managing information
The cloud continues to be much discussed and the many benefits it offers organizations of all sizes. Rarely is it mentioned, though, that there are a number of complications …
Growing dynamic in politically-motivated hacktivism
While financial cybercrime becomes ever more entrenched through a consolidating demand and supply chain, the hacktivist landscape is more turbulent, vacillating constantly in …
Industries on the cyber war front line
ThreatTrack Security published a study that looks at the security vulnerabilities of two industries most often targeted by cybercrime: energy and financial services. 72% of …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations