Help Net Security

Encryption we can trust: Are we there yet?
Encryption is arguably the most important single security tool that we have, but it still has some serious growing up to do. The current debate about the pros and cons of …

SMEs under attack, security readiness still low
When it comes to securing their data, SMEs remain several steps behind their larger counterparts. Some reasons for the disparity in security readiness may be that SMEs have …

SideStepper vulnerability can be used to install malicious apps on iOS
Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive …

Consumers living in smart homes are willing to sell personal data
A majority of respondents worldwide might be willing to share their personal data collected from their smart home with companies in exchange for money, and 70 percent agree …

Linux security isn’t enough to stop data breaches
There is a difference between the security of an operating system and the security of the data created, which is edited and manipulated by people and saved on the operating …

NIST security standard to protect credit cards, health information
For many years, when you swiped your credit card, your number would be stored on the card reader, making encryption difficult to implement. Now, after nearly a decade of …

Commonly used IoT devices vulnerable to privacy theft
A technical investigation by Bitdefender has discovered that four commonly used Internet of Things (IoT) consumer devices are vulnerable to attack. The analysis reveals that …

Add IRM, data security and encryption to any app
Vera launched its new IRM-as-a-Service (IRMaaS) product, allowing developers to use Vera’s data security platform to build encryption, tracking, policy enforcement, and …

Don’t get stuck with dead end User Behavior Analytics
As the frequency of sophisticated cyberattacks continue to increase, User Behavior Analytics (UBA) has taken center stage. It now seems like every vendor in security, no …

Creating secure devices for the Internet of Things
The Internet of Things (IoT) and subsequent explosion of connected devices have created a world of opportunities we might never have anticipated. But have these new …

Security and privacy issues in QQ Browser put millions of users at risk
Citizen Lab researchers identified security and privacy issues in QQ Browser, a mobile browser produced by China-based Tencent, which may put millions of users of the …

Economics of connections will fuel digital business
Business and IT leaders must structure their business and technology investments in a way that will capitalize on the new economic realities of a digital economy, according to …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware