Help Net Security
Most would stop using digital payments if breached
88% of respondents to a survey conducted by Wakefield Research would stop using digital payments if they personally fell victim to cybercriminal activities as a result of a …
Firmware security: An overlooked threat
An increase in connected devices as part of organizations’ hardware footprint, combined with increasingly inventive attack methods from cybercriminals, has brought firmware …
Smart cities face unique and escalating cyber threats
Ninety-eight percent of respondents to a survey conducted by Dimensional Research consider smart cities at risk for cyber attacks. Smart cities use IT solutions to manage a …
The realities of WiFi troubleshooting
WiFi continues to be the source of serious problems and confusion in enterprise K-12 and higher education. The most common issues reported were WiFi association and WiFi …
Major international law enforcement operation targets airline ticket fraud
193 individuals suspected of traveling with airline tickets bought using stolen, compromised or fake credit card details have been detained in a major international law …
Proliferation of vulnerable open source components creates growing risk
The continued and persistent use of components in software development is creating systemic risk in our digital infrastructure. A new Veracode report also found that companies …
Public Wi-Fi: Users’ habits and perceptions of risk
A new Xirrus survey highlights users’ habits and perceptions of risk when connecting to public Wi-Fi. The survey polled more than 2,000 business users, including executives …
Securing medical devices: Cybersecurity spending to triple by 2021
The medical IoT is set to transform healthcare through smart medical devices. However, their success is in jeopardy if cybersecurity concerns are not addressed immediately.
Civilization infrastructure: Connected sensors and digital intelligence
A new type of infrastructure needs to be built that is not just going to reshape business, but also the way people live, according to Gartner. CIOs are the builders of this …
Four ways to keep data safe during election season
There is no shortage of passionate feelings among voters when it comes to this November’s presidential election. Those feelings extend tenfold to each candidate’s campaigns. …
Fight fraud: Scams, identity theft, ransomware attacks
In an increasingly technology-oriented world, cybercrime has become all too common for both consumers and businesses. Internet crime takes many forms and includes everything …
Critical cybersecurity priorities for the next US president
While the US presidential campaign has occasionally focused on cyber security, the topic demands more urgent attention from the individual elected as the 45th President of the …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down