Help Net Security
Week in review: The death of Java plugin, Magento fixes e-store hijacking flaw, cybercriminals targeting healthcare data
Here’s an overview of some of last week’s most interesting news and articles: There’s no turning back: Say goodbye to the perimeter If you’ve been following …

The history of cyber attacks: From ancient to modern
In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a …

Compromised enterprise networks fuel 236 percent increase in viruses and worms
Solutionary performed a broad analysis of the threat landscape, which uncovered several key findings. One of the most compelling finding links the rapid growth (236 percent) …

Consumers are increasingly concerned about privacy and they’re acting on it
More Americans are concerned about not knowing how the personal information collected about them online is used than losing their principal source of income. A new study by …

Innovation Sandbox Contest 2016 finalists announced
RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …

Why cybercriminals target healthcare data
In 2015, one in three Americans were victims of healthcare data breaches, attributed to a series of large-scale attacks that each affected more than 10 million individuals. …

Most large organizations will have a Chief Data Officer by 2019
The race to drive competitive advantage and improved efficiency through better use of information assets is leading to a sharp rise in the number of chief data officers …

Larger, more complex, financially motivated DDoS attacks on the rise
DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, the results of Arbor Networks’ …

1 in 3 home routers will be used as public Wi-Fi hotspots by 2017
Juniper Research predicts that at least 1 in 3 home routers will be used as public Wi-Fi hotspots by 2017, and that the total installed base of such dual-use routers will …

Data protection and breach readiness guide
The Online Trust Alliance (OTA) released its 2016 Data Protection and Breach Readiness Guide, which provides prescriptive advice to help businesses optimize online privacy and …

Europe’s cyber security accelerator program helps entrepreneurs
A new program to support cyber security startups will help develop innovative technical solutions. Start ups who want to offer cyber security solutions will be able to get …

How much could a cyber attack cost the HMRC?
HMRC could face compensation claims of over £13 billion if it were to lose people’s personal and financial data as a result of a cyber attack, according to a new study by …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware