Help Net Security
End-to-end encryption is key for securing the Internet of Things
The Internet of Things (IoT) is one of the hottest buzzwords these days. It seems like almost everything is being connected, including cars, streetlights, oil rigs, wearables …
Innovative security research comes to Singapore
Hack In The Box is set to host its first HITB GSEC security event in Singapore next month with a 3 day single track conference and an all women fireside chat session held …
Week in review: iOS malware compromising Apple accounts, and fake recruiters on LinkedIn targeting infosec pros
Here’s an overview of some of last week’s most interesting news and articles:Over 225,000 Apple accounts compromised via iOS malwareResearchers from Palo Alto …
Operational security and cybersecurity come together in Anaheim
The crossroads of cybersecurity and operational security is in Anaheim, California. That’s where the (ISC)2 Security Congress is co-located with ASIS 2015, making this …
PayPal stored XSS vulnerability exposed
Bitdefender researchers have located a stored XSS vulnerability in PayPal that leaves the e-payment service open for hackers to upload maliciously crafted files, capable of …
Vulnerable gambling apps put corporate data at risk
Based on an analysis of hundreds of thousands of scans of mobile apps installed in actual corporate environments, Veracode found that the average global enterprise has …
It’s undeniable, IoT will change security forever
Over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of Things (IoT) by …
Cyber crooks opt for APT method for delivering malware
“Delivering malware without it being flagged by users and security solutions is one of the biggest challenges malware peddlers face. Luckily for them, if they …
Best practices for ensuring compliance in the age of cloud computing
When was the last time you heard someone utter the sentence, “I’m looking forward to the audit next week.” Most likely, never. Since its invention, the word “audit” has struck …
95% of websites in 10 new TLDs are suspicious
Much has changed since the early days of the Internet when the Web had only six common top level domains (TLDs). Back then, what most consumers and businesses encountered were …
Snoopers’ Charter will cause extreme rise in business costs
The UK Government’s Investigatory Powers Bill, dubbed ‘Snoopers’ Charter’ by critics, has already been met with contention from tech giants, Google, Facebook and Microsoft, …
Verizon and Splunk deliver actionable threat intelligence
Verizon Enterprise Solutions launched its Data Breach Investigations Report (DBIR) app for Splunk software. The new free downloadable app helps take the guess work out of …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?