Help Net Security
Malware peddlers prefer deceptive tactics to exploits
Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …
The prime target for malicious emails
In the first quarter of 2014 spammers started imitating messages from mobile applications. They especially like the popular mobile messengers – WhatsApp, Viber and …
Calling the cloud: Challenges of managing information
The cloud continues to be much discussed and the many benefits it offers organizations of all sizes. Rarely is it mentioned, though, that there are a number of complications …
Growing dynamic in politically-motivated hacktivism
While financial cybercrime becomes ever more entrenched through a consolidating demand and supply chain, the hacktivist landscape is more turbulent, vacillating constantly in …
Industries on the cyber war front line
ThreatTrack Security published a study that looks at the security vulnerabilities of two industries most often targeted by cybercrime: energy and financial services. 72% of …
Seagate Wireless Plus offers advanced cloud backup
The Seagate Wireless Plus mobile device storage now consists of a family of capacities at 500GB, 1TB and 2TB versions to suit every need along with integration with cloud …
25% of breaches go undetected for more than a day
Recent data breaches have had little impact on the security controls of retail and financial organizations, according to Tripwire. Of the 102 financial organizations and 151 …
Responding to data breaches and increasing security
In this podcast, recorded at Infosecurity Europe 2014, Josie Herbert interviews Craig Carpenter, the Chief Cybersecurity Strategist for AccessData. Carpenter tackles the …
EU Data Protection Regulation: Detection is the best prevention
The UK government recently published guidelines for companies covering the five basic controls that businesses must follow to ensure a minimum level of protection. The goal of …
2014 starts with record-breaking malware traffic
AppRiver released a detailed analysis of web and email-borne threats and malware trends traced between January and March 2014. During the first quarter of 2014, AppRiver …
Infosecurity Europe 2014 showcase
Here’s a video overview of Infosecurity Europe 2014, that took place last week in London. For a roundup of news from the conference, including photo galleries, podcasts …
Wi-Fi Smart Plug: Control devices from anywhere
D-Link announced the Wi-Fi Smart Plug (DSP-W215), which allows users to monitor and control their home’s electronic devices from anywhere. Using the free mydlink app for …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online