Help Net Security
Most consumers believe cloud-based apps can be hacked
Consumers often don’t realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data, …
Nearly 2% of all smartphones are compromised or high risk
By analyzing worldwide threat Intelligence data based on millions of monthly security tests from July through September 2015, a new report found 41 percent of mobile devices …
Week in review: WhatsApp data collection, roadblocks to implementing CISA, and how US law enforcement uses Stingrays
Here’s an overview of some of last week’s most interesting news and articles:European Parliament members want member states to protect Edward SnowdenToo little has …
10 tips to avoid viruses on Halloween
As we get closer to Halloween, hackers take advantage of the most popular Hollywood titles to launch so-called BlackHat SEO attacks, i.e. false Google and other search engine …
Second teenager arrested in connection with TalkTalk hack
Police have arrested a second teenage boy in connection with the investigation into alleged data theft from TalkTalk.On Thursday, 29 October, detectives from the Metropolitan …
Real-world roadblocks to implementing CISA
The recent approval of CISA (the Cybersecurity Information Sharing Act) by the US Congress and Senate is paving the way for broader security collaboration. There is a rapidly …
China is the top target for DDoS reflection attacks
China bore the brunt of DDoS reflection attacks last month, with 61 percent of the top attack destinations observed hitting Chinese-based systems, according to Nexusguard. Of …
Online Trust Alliance releases new Internet of Things Trust Framework
The Online Trust Alliance (OTA) updated the IoT Trust Framework, a comprehensive global initiative that provides guidance for device manufacturers and developers to enhance …
CoinVault and Bitcryptor ransomware victims don’t need to pay the ransom
Kaspersky Lab has added an additional 14,031 decryption keys to their free repository, enabling all those who have fallen victim to CoinVault and Bitcryptor ransomware to …
Most are unaware of the seriousness of medical data theft
Most remain unaware of their vulnerability to medical data theft, and the fact that it can be far more damaging than credit card or social security number compromise, …
The top threat vector for mobile devices? Porn
As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …
Creating a secure network for the Internet of Things
The attitudes and perceptions around the Internet of Things (IoT) span a wide array of views from the extreme excitement of consumers and manufacturers, to the concerns …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)