Help Net Security
                                Add IRM, data security and encryption to any app
Vera launched its new IRM-as-a-Service (IRMaaS) product, allowing developers to use Vera’s data security platform to build encryption, tracking, policy enforcement, and …
                                Don’t get stuck with dead end User Behavior Analytics
As the frequency of sophisticated cyberattacks continue to increase, User Behavior Analytics (UBA) has taken center stage. It now seems like every vendor in security, no …
                                Creating secure devices for the Internet of Things
The Internet of Things (IoT) and subsequent explosion of connected devices have created a world of opportunities we might never have anticipated. But have these new …
                                Security and privacy issues in QQ Browser put millions of users at risk
Citizen Lab researchers identified security and privacy issues in QQ Browser, a mobile browser produced by China-based Tencent, which may put millions of users of the …
                                Economics of connections will fuel digital business
Business and IT leaders must structure their business and technology investments in a way that will capitalize on the new economic realities of a digital economy, according to …
                                Banks failing with password management, but why?
A recent study shows some terrifying results: banks in the U.S. often have less secure password policies in place than do social media websites. Specifically, the study found …
                                Advanced Persistent Bot activity on the rise
Bad bots are used by fraudsters and are the key culprits behind web scraping, brute force attacks, competitive data mining, online fraud, account hijacking, data theft, …
                                7 Iranians indicted for cyber attacks on US banks and a dam
The US Justice Department unsealed on Thursday an indictment charging seven Iranian computer specialists for conducting a coordinated campaign of distributed denial of service …
                                The things you discover when you test RF networks
In my work as a penetration tester for SureCloud, I’m often asked to look at unusual, out-of-the-ordinary vulnerabilities. This was the case when a major UK financial …
                                How tax fraud occurs and how to stay safe
The IRS is now taking up to 21 days to review a tax return. Last year, a similar tax return took seven days to review, according to iovation. This increase of taking up to …
                                Former US Embassy employee imprisoned for sextortion
Former US State Department employee Michael C. Ford has been sentenced to four years, and nine months in prison for perpetrating a widespread, international e-mail phishing, …
                                Enhance your security ecosystem with TITUS Illuminate
The amount of data being created, shared and stored is growing exponentially. With more people accessing and storing files in a multitude of network and cloud repositories, …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down