Help Net Security

7 Iranians indicted for cyber attacks on US banks and a dam
The US Justice Department unsealed on Thursday an indictment charging seven Iranian computer specialists for conducting a coordinated campaign of distributed denial of service …

The things you discover when you test RF networks
In my work as a penetration tester for SureCloud, I’m often asked to look at unusual, out-of-the-ordinary vulnerabilities. This was the case when a major UK financial …

How tax fraud occurs and how to stay safe
The IRS is now taking up to 21 days to review a tax return. Last year, a similar tax return took seven days to review, according to iovation. This increase of taking up to …

Former US Embassy employee imprisoned for sextortion
Former US State Department employee Michael C. Ford has been sentenced to four years, and nine months in prison for perpetrating a widespread, international e-mail phishing, …

Enhance your security ecosystem with TITUS Illuminate
The amount of data being created, shared and stored is growing exponentially. With more people accessing and storing files in a multitude of network and cloud repositories, …

Network security operations becoming more difficult
One hundred and fifty enterprise IT security professionals from a wide range of industries were surveyed by Enterprise Strategy Group (ESG) to gain a better understanding of …

5 key questions to determine your security posture
To understand any businesses’ security posture, one must first understand the eight categories of cybersecurity that is impacted: security intelligence, fraud, people, …

Data centric security key to cloud and digital business
Recent breaches demonstrate the urgent need to secure enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. …

Growing security negligence in the workplace
A surprising disconnect exists between employees’ growing concern over the security of their personal information and their attitudes toward data security practices in …

Amazon selfie password: Is this the future?
Amazon’s “Selfie Authentication” allows the site’s customers to user facial recognition to authenticate themselves to the website in order to make a purchase. While not …

Lynis 2.2.0: New features, tests, and enhancements
Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …

Demand for advanced DDoS mitigation on the rise
The increasing popularity of DDoS attacks as a tool to disrupt, harass, terrorize and sabotage online businesses is boosting demand for mitigation solutions. In the face of …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?