Help Net Security

Most employees use unsanctioned group chat tools
Employees are sharing sensitive company information using group chat tools that are not officially sanctioned for use, according to SpiderOak. The survey consisted of 600 …

Apple’s malware problem is accelerating
For a long time, one of the most common reasons for buying an Apple computer over a Windows-based one was that the former was less susceptible to viruses and other malware. …

Kali Linux certification, first official Kali book on the horizon
The Kali Linux distribution celebrates its 10th anniversary this year. The hugely popular open source project, maintained by Offensive Security, announced today that its new …

Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!
A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University …

Growing risk associated with mobile and IoT application security
Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …

Retailers largely lack on-site security and IT expertise
A new Cybera survey of more than 50 retail professionals found that many retailers lack the necessary IT staff at the store level to ensure proper solution implementation and …

Open source cybersecurity framework for the automotive industry
A consortium of researchers announced the development of a universal, free, and open source framework to protect wireless software updates in vehicles. The team issued a …

Majority of SOCs are below optimal maturity levels
With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …

82% of executives experienced a fraud incident in the past year
Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The …

What resellers think about threats to customers
A new survey, designed to capture the reseller’s perspective on customer cyber threat concerns and their overall understanding of the firewall market, examined the views …

Organizations to gradually replace physical access cards with smartphones
In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner said that 20 percent of organizations will use …

RSA Conference Innovation Sandbox Contest 2017 finalists announced
RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)