Help Net Security

Banking customers hesitant to use mobile features due to security concerns
Banking customers are hesitant to use mobile features due to fraud and security concerns, according to Kaspersky Lab and IDC Financial Insights. Their findings show that of …

The state of security? No one cares about a breach
In an election year, everyone asks the question about whether or not you are better off than you were four years ago. There are many ways to answer such a question, and …

Cloud security market in the retail sector expected to grow
The global cloud security market in the retail sector is expected to grow at a CAGR of close to 21% until 2020, according to Technavio. Cloud security is a technology designed …

Lack of security talent is a threat to corporate safety
Large businesses with a small amount of full-time security experts pay almost three times more to recover from a cyberattack than those businesses with in-house expertise, …

Five tips to help execute an employee training program
One of the best ways to reduce the risk of data breaches is employee training. This is particularly important during the fall “back to business” season when many …

New wave of targeted attacks focus on industrial organizations
Kaspersky Lab researchers discovered a new wave of targeted attacks against the industrial and engineering sectors in 30 countries around the world. Dubbed Operation Ghoul, …

The inner workings of the Cerber ransomware campaign
Check Point’s research team has analysed the inner workings of Cerber, the world’s biggest ransomware-as-a-service scheme. Cerber execution flow Cerber is a ransomware …

Subverting protection into DDoS attacks
On average, DNSSEC reflection can transform an 80-byte query into a 2,313-byte response, an amplification factor of nearly 30 times, which can easily cause a network service …

Incident response challenge: How to get out of Firefighter Mode
Organizations tend to have the mindset that their IT and security teams should play the role of First Responders on the scene of a security incident. They expect their IT and …

eBook: Defending against crypto ransomware
Unlike traditional malware, crypto ransomware doesn’t steal information. Instead, it encrypts a victim’s documents, spreadsheets, pictures, videos and other files, and then …

Employee awareness training: Key component of IT security initiatives
IT projects are most effective when they take into account people, processes, and technology. These three components should be addressed concurrently so the organization can …

New method for detecting hardware Trojans
Modern computer chips are made up of hundreds of millions – often billions – of transistors. Such complexity enables the smartphone in your back pocket to perform all manner …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems