Help Net Security

Increase in credit card leaks with high profile apps and sites
A new report reveals a continued rise in apps and mobile websites leaking credit card data, with several new cases from prominent brands, including the Hong Kong metro system. …

IT channel security practices will balance products, processes and skills
A comprehensive security offering is quickly moving from simple product installation to an ongoing process. IT channel companies that highlight processes and education along …

Anomali lands $30 million in series C funding
Anomali, the provider of ThreatStream threat intelligence and Anomali Enterprise platforms, has raised $30 million in series C funding. The round, led by Institutional Venture …

Opera browser now comes with free built-in VPN
Opera added a free VPN client with unlimited data usage in its newest developer version. All other VPNs for the major desktop browsers are extensions, with most of them based …

Exploit kits: The rise in user-friendly malware
In past years, we’re seen a massive increase in the use of exploit kits. No website is too great to withstand the many powerful kits, with the Mail Online famously …

A global data analysis of hostile activity
Solutionary’s latest Global Threat Intelligence Report contains information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion …

Ubuntu 16.04 LTS introduces “snaps” for new robust, secure app format
Canonical released Ubuntu 16.04 LTS, featuring the new “snap” package format and LXD pure-container hypervisor. An Ubuntu Long Term Support (LTS) release is …

Why a layered defense is your best protection against malware
As long as there is software there will be vulnerabilities and those vulnerabilities will be exploited. It’s a bold statement, and oddly enough technically incorrect. In …

Ransomware attacks escalate, companies largely unprepared
Ransomware attacks against endpoints have recently taken place against hospitals in the US and Germany. Attacks have increased in severity to the point that the FBI issued an …

Exposing the Cybercrime as a Business model
Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2015. Experts gathered real-world data from hundreds of breach …

Employees risk corporate security by accessing pirated content
6 in 10 Brits who use personal devices for work also use the same device for streaming or downloading pirated content. Whilst the research, conducted by OnePulse, found that …

Five steps to GDPR compliance
For any organisations processing personal data the General Data Protection Regulation (GDPR) is important news. Agreed upon just days ago, after years of negotiations, the …
Featured news
Resources
Don't miss
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days