Help Net Security
The top threat vector for mobile devices? Porn
As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …
Creating a secure network for the Internet of Things
The attitudes and perceptions around the Internet of Things (IoT) span a wide array of views from the extreme excitement of consumers and manufacturers, to the concerns …
New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers
Akamai has observed three new reflection DDoS attacks in recent months: NetBIOS name server reflection, RPC portmap reflection, and Sentinel reflection.In a reflection DDoS …
Are IT security pros optimistic or naïve?
Half of IT security practitioners in the U.S. view their organization as an unlikely target for attack, according to a Ponemon Institute survey of 614 IT security …
What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware
Next year, continued growth in online extortion, hacktivism and mobile malware is expected, as well as a shift to an offensive cybersecurity posture for government entities …
The security community’s reaction as CISA passes US Senate
On Tuesday, the US Senate has passed the Cybersecurity Information Sharing Act (CISA), a legislation that will allow companies to share information about the cyber attacks …
Social experiment: 200 USB flash drives left in public locations
Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and …
One in 20 apps on private PCs are end-of-life
Secunia Research revealed the state of security for PC users in a total of 14 countries, including the US. One in 20 applications on private US PCs are end-of-life and 12 …
The average organization experiences 9 insider threats each month
After analyzing actual cloud usage across over 23 million employees, Skyhigh Networks uncovered how user behaviours put companies at risk and how catching and managing this …
WhatsApp collects phone numbers, call duration, and more!
A recent network forensic examination of popular messaging service WhatsApp is offering new details on the data that can be collected from the app’s network from its new …
IT admits obstacles to user mobility due to security concerns
Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing sensitive corporate data and resources …
W3C to make payments easier and more secure
The World Wide Web Consortium (W3C) launched the Web Payments Working Group to help streamline the online “check-out” process and make payments easier and more …