Help Net Security

DB Networks launches Layer 7 Database Sensor
DB Networks introduced a product that provides OEM partners with real-time deep protocol analysis of database traffic. By integrating this technology into their products, …

The rise of the Chief IoT Officer
Half of UK businesses (54%) plan to employ a Chief IoT Officer in the next year, especially in the education (63%), retail (63%) and telecomms (64%) industries, according to …

Cyber Risk Board Forum to take place during RSA Conference 2016
RSA Conference has teamed up with NYSE Governance Services to host the Cyber Risk Board Forum. Set to take place February 29, 2016, in San Francisco, in conjunction with the …

Kotlin programming language for JVM and Android reaches version 1.0
Kotlin is an open source programming language for JVM and Android that combines OO and functional features and is focused on interoperability, safety, clarity and tooling …

Security guidance for the Internet of Things
Embedded systems and connected devices are already deeply woven into the fabric of our lives, and the footprint is expanding at a staggering rate. Gartner estimates that 4.9 …

Anonymous networks 101: Into the heart of the Darknet
Here’s a riddle: What’s hidden in plain sight Stretches the entire known world Vilified and Adored Born from a secret US Government project Maintains secret societies Requires …

Week in review: Dyre gang takedown, and the most popular hacking methods
Here’s an overview of some of last week’s most interesting news and articles: Know your enemy: The most popular hacking methods Outsiders want to become insiders …

Know your enemy: The most popular hacking methods
Outsiders want to become insiders with the least possible effort, and insiders help them do so – mostly accidentally, according to Balabit. 54% of the survey respondents …

A look into the current state of mobile security
A quarter of all mobile apps have at least one high risk security flaw, 35 percent of communications sent by mobile devices are unencrypted, and the average mobile device …

When it comes to cyber attack detection, IT pros are overconfident
A new study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls that must be in place to …

IoT security guidelines for providers, vendors, and network operators
The GSMA Association has published new guidelines designed to promote the secure development and deployment of services in the growing Internet of Things (IoT) market. …

Exposing the Adwind RAT: One of the biggest malware platforms in existence today
At the end of 2015, Kaspersky Lab researchers became aware of an unusual malware program that had been discovered during an attempted targeted attack against a bank in …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems