Help Net Security

Retail, gaming industries hardest hit with web application and DDoS attacks
Akamai published the Q1 2016 State of the Internet – Security Report, which provides a detailed view of the global cloud security threat landscape and in-depth analysis …

Do companies take customers’ security seriously?
75 percent of adults in the UK would stop doing business with, or would cancel membership to, an organisation if it was hacked. This suggests, however, that a quarter would …

Proactive threat hunting: Detect, isolate and eradicate
Organizations worldwide wait until they fall victim to a damaging cyber attack before engaging a provider of managed security services, or MSS, according to Raytheon. …

Vulnerabilities in Facebook Chat and Messenger exploitable with basic HTML knowledge
Check Point’s security research team has discovered vulnerabilities in Facebook’s standard online Chat function, and its separately downloaded Messenger app. The …

789% year-over-year spike in malware and phishing
An analysis of phishing email campaigns from the first three months of 2016 has seen a 6.3 million increase in raw numbers, due primarily to a ransomware upsurge against the …

The security concerns of free email service provider use
Thanks to modern collaboration tools, today’s workforce can be more secure, efficient and powerful than ever. However, leading organizations recognize that security threats …

Will the next major data breach start on mobile?
Over the past few years, we have seen a spike in major data breaches from noteworthy businesses such as Target, Home Depot, and Sony (to just name a few). While data breaches …

Unsurprisingly, malware incidents set to grow
Up to half of US organizations have experienced malware attacks which have had a severe impact on their business operations, according to new research by IDG Connect. Forty …

Week in review: Windows 0day for sale, and lessons learned from 17 years as an infosec trainer
Here’s an overview of some of last week’s most interesting news, reviews and articles: ICS-focused IRONGATE malware has some interesting tricks up its sleeve …

What is the actual value of a CISO?
For some people, it’s hard to understand what keeps them up at night. For you, the CISO, things are much clearer. Your 3:47 am thoughts are filled with data breaches, malware, …

Surprise! Most IoT products have inadequate security
While the IoT era of products brings innumerable advances and modern conveniences to the lives of consumers, the connected nature of these products creates unintentional ports …

Are you prepared for future information management requirements?
While 46 percent of federal information management professionals cite managing all types of information assets, regardless of format, as a priority for their field, many feel …