Help Net Security
Defending the enterprise in an increasingly complex environment
Technology has transformed the way organisations work and its evolution is now faster than ever before. The promise of IT transformation presents many opportunities for …
HTC phone stores fingerprints in easily accessible plaintext
Pressing a finger on your mobile phone’s fingerprint scanner has to be the easiest, most seamless way to unlock the device, and this is why more and more manufacturers …
Week in review: New OS X threats, and how to protect your privacy on Windows 10
Here’s an overview of some of last week’s most interesting news and articles:What’s the state of your software?In the face of the repeated high profile breaches of …
EFF’s Privacy Badger prevents users being tracked online
The Electronic Frontier Foundation has finally released version 1.0 of Privacy Badger, a browser extension that blocks some of the sneakiest trackers that try to spy on your …
The GasPot experiment: Hackers target gas tanks
Physically tampering with gasoline tanks is dangerous enough, given how volatile gas can be. Altering a fuel gauge can cause a tank to overflow, and a simple spark can set …
Vulnerabilities in 2015: 0-days, Android vs iOS, OpenSSL
Secunia has taken an early peek at the trend in vulnerabilities for 2015, and has presented the results at Black Hat USA 2015. Seven months into the year, the number of …
Getting BYOD right
According to a survey conducted by Kaspersky Lab in conjunction with B2B International, around half of the consumers surveyed also use their devices for work. However, only …
Disrupting trust models: An evolution in the financial services sector
The way we interact with service providers – whether travel organisations, music suppliers or retailers – has changed to be almost unrecognisable from five years’ ago. From …
Easily exploitable Certifi-gate bug opens Android devices to hijacking
Check Point’s mobile security research team discovered a vulnerability in Android that affects phones, tablets and devices made by major manufacturers including LG, …
Photo gallery: Black Hat USA 2015, part 2
The Black Hat USA 2015 conference is underway at the Mandalay Bay Convention Center in Las Vegas. Take a peek at the happenings in the Business Hall.Featured vendors and …
Corporate networks can be compromised via Windows Updates
Yesterday at Black Hat USA 2015, researchers from UK-based Context Information Security demonstrated how Windows Update can be abused for internal attacks on corporate …
Identify and track sensitive corporate data in real-time
InfoGPS Networks revealed at Black Hat USA 2015 software able to identify, classify, and track sensitive data in real-time across the organization. “Cybersecurity software has …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)