Help Net Security
Wargame teaches senior leaders about strategic threats and risks
On Oct. 13 Booz Allen and the FC2 held a cybersecurity wargame simulation for senior officials in the public and private sectors at the University of South Florida, the home …
8 key online fraud behaviors and patterns
Sift Science examined data from 1.3 million online transactions and profiles in various industries from August 2014 to August 2015. Data was cross-referenced with third-party …
Why everyone should care about two-factor authentication
In the age of BYOD, corporate employees and consumers alike have access to incredible computing power in the palms of their hands. With almost our entire digital lives …
Consumers increasingly adopting personal security measures
With the increase of personal data being stored on mobile devices, a new survey showed that 61 percent of wireless consumers use PINs/passwords, up 20 percent from the survey …
1 in 4 organizations have experienced an APT
A new ISACA study found that more than one in four (28%) have already experienced an APT attack.The study found that mobile device security continues to lag at many …
Secret code in color printers enables government tracking
A research team led by the EFF recently broke the code behind tiny tracking dots that some color laser printers secretly hide in every document.The U.S. Secret Service …
UK workers are significantly lacking in security awareness
A new study has revealed that the majority of UK workers are not Cyber Savvy and have failed a Cyber IQ test, which was compiled by experts from ESET.Study participants were …
Internet of Things: Rethinking privacy and information sharing
It is hard to imagine a world where the Internet of Things (IoT) is our collective “normal” – when our interaction with devices around us is so embedded in our lives, how we …
Week in review: WiFi jamming, Flash zero-day actively exploited, and abusing the Internet of Things
Here’s an overview of some of last week’s most interesting news and articles:WiFi jamming attacks more simple and cheaper than everA security researcher has …
Safeguarding data in the healthcare industry
Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, new research from IS Decisions has revealed. Despite …
We’ve been hacked! Okay, I’ll deal with it next week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in …
How boards calibrate strategy and risk
Corporate boards are deepening their involvement in company strategy and refining their oversight of the critical risks facing the company, according to a recent global survey …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?