Help Net Security
Companies still lack security controls for accessing enterprise applications
Despite widespread and highly publicized security breaches, most companies still fail to require necessary security controls for accessing enterprise applications, including …
Employee activities that every security team should monitor
Next time you are at a cocktail party with a group of IT security professionals, try this icebreaker – “Which of the following user activities could open the door to a data …
Wargame teaches senior leaders about strategic threats and risks
On Oct. 13 Booz Allen and the FC2 held a cybersecurity wargame simulation for senior officials in the public and private sectors at the University of South Florida, the home …
8 key online fraud behaviors and patterns
Sift Science examined data from 1.3 million online transactions and profiles in various industries from August 2014 to August 2015. Data was cross-referenced with third-party …
Why everyone should care about two-factor authentication
In the age of BYOD, corporate employees and consumers alike have access to incredible computing power in the palms of their hands. With almost our entire digital lives …
Consumers increasingly adopting personal security measures
With the increase of personal data being stored on mobile devices, a new survey showed that 61 percent of wireless consumers use PINs/passwords, up 20 percent from the survey …
1 in 4 organizations have experienced an APT
A new ISACA study found that more than one in four (28%) have already experienced an APT attack.The study found that mobile device security continues to lag at many …
Secret code in color printers enables government tracking
A research team led by the EFF recently broke the code behind tiny tracking dots that some color laser printers secretly hide in every document.The U.S. Secret Service …
UK workers are significantly lacking in security awareness
A new study has revealed that the majority of UK workers are not Cyber Savvy and have failed a Cyber IQ test, which was compiled by experts from ESET.Study participants were …
Internet of Things: Rethinking privacy and information sharing
It is hard to imagine a world where the Internet of Things (IoT) is our collective “normal” – when our interaction with devices around us is so embedded in our lives, how we …
Week in review: WiFi jamming, Flash zero-day actively exploited, and abusing the Internet of Things
Here’s an overview of some of last week’s most interesting news and articles:WiFi jamming attacks more simple and cheaper than everA security researcher has …
Safeguarding data in the healthcare industry
Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, new research from IS Decisions has revealed. Despite …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous