Help Net Security
Operation targets users of remote access trojans across Europe
In December, Europol and a number of law enforcement and judicial authorities across Europe carried out a two weeks long coordinated action against the use of remote access …
How to eliminate encryption silos
Working in the encryption business, you’ll quickly learn that there are a number of problems that organizations can run into while deploying the technology. The …
Are your competitors organizing DDoS attacks against you?
According to recent research from Kaspersky Lab and B2B International, nearly half (48 per cent) of the companies surveyed believe they know the identity and motivation of …
Is Hadoop secure enough for the enterprise?
An ever-increasing number of organisations are turning to big data to gain valuable insight that can be immediately acted on to increase revenue, lower operating costs, or …
Cybercriminals increasingly hunting down the money
The tools used by cyber-criminals against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab’s review of corporate threats in …
Week in review: First ever EU rules on cybersecurity, insider threats, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: New Steam escrow system drives impatient users to fake trading sites serving malware …
Inside job: 6 ways employees pose an insider threat
CISOs and CIOs have seen the prospects of losing control over data and the accompanying data privacy and security concerns as the biggest hurdle to cloud adoption. According …
SQL injection has surfaced as the no. 1 attack in 2015
A new survey from Ponemon Institute finds that nearly 80 percent of enterprises say that their organization’s portfolio of applications has become more vulnerable to …
Malware threats on pirated content sites
Content theft sites pose a serious and growing threat to Internet users by exposing them to harmful malware that can lead to identity theft, financial loss and computers being …
RSA Conference opens Innovation Sandbox Contest
The RSA Conference annual Innovation Sandbox Contest is now accepting submissions to name the “RSAC Most Innovative Startup 2016.” Past winners include successful companies …
Six trends that will further the development of the Internet of Things
1. The death of the password is rapidly approaching. New and more serious data breaches among well known consumer brands will continue to erode faith in perimeter and …
The impact of data breaches on customer loyalty
Nearly two-thirds (64%) of consumers worldwide say they are unlikely to shop or do business again with a company that had experienced a breach where financial information was …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services