Help Net Security
Compliance vs. cybersecurity: Insurers face competing priorities
Over the next 12 months insurers will face competing priorities for resources and time, with cybersecurity preparedness challenging overall regulatory compliance readiness, …
GnuPG 2.1.9 released
The GNU Privacy Guard (GnuPG) is a complete and free implementation of the OpenPGP standard which is commonly abbreviated as PGP. It allows to encrypt and sign data and …
Don’t sink your network
Too many of today’s networks are easy to sink. One attack pierces the perimeter, and all of the organisation’s most sensitive data comes rushing out. Soon after, their logo is …
Theoretical computer science provides answers to data privacy problem
The promise of big data lies in researchers’ ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the …
Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure Android smartphones
Here’s an overview of some of last week’s most interesting news and articles:The price of the Internet of Things will be a vague dread of a malicious …
LogMeIn to acquire LastPass for $125 million
LogMeIn has agreed to acquire LastPass, the popular single-sign-on (SSO) and password management service.Under the terms of the transaction, LogMeIn will pay $110 million in …
Do attribution and motives matter?
Whenever people think of APTs and targeted attacks, people ask: who did it? What did they want? While those questions may well be of some interest, we think it is much more …
Most are concerned about security of healthcare data
More than three-fourths (76 percent) of U.S. adults are concerned that their healthcare records are vulnerable to hackers, according to the University of Phoenix.Perhaps not …
Top strategic IT predictions for 2016 and beyond
Gartner’s top predictions for 2016 look at the digital future, at an algorithmic and smart machine-driven world where people and machines must define harmonious …
CIOs agree, IT is more complex than ever
Nine out of ten UK CIOs (93%) believe that IT complexity has increased, according to Trustmarque. The research has revealed that cloud computing (66%), legacy technology (51%) …
New Toshiba CMOS image sensor improves recognition and authentication
In recent years, mobile devices have adopted user authentication systems to protect access and information security. Password entry remains the most common, but finger print …
Fake Android apps bypass Google Play store security
“ESET unveiled fake apps available at the official Google app store. Posing as popular game cheats, such as Cheats for Pou, Guide for SubWay and Cheats for SubWay, these …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military