Help Net Security
TeslaCrypt 2.0 makes it impossible to decrypt affected files
“Kaspersky Lab has detected curious behavior in a new threat from the TeslaCrypt ransomware encryptor family. In version 2.0 of the Trojan notorious for infecting …
High severity Internet Explorer 11 vulnerability identified after Hacking Team breach
After analyzing the leaked data from last week’s attack on Hacking Team, Vectra researchers discovered a previously unknown high severity vulnerability in Internet …
The difficult task of meeting compliance needs
Compliance is a complex issue in many industries and organizations know all too well that there are major fines and potential punishments for not meeting the laws and …
3 ways to stop insider threats in your organization
No one wants their organization to be the next poster child for a major informational breach. No one wants their company to make headlines for having their data compromised or …
Identifying the five principal methods of network attacks
Companies are underestimating the risk of failing to provide security training to non-technical staff.A new Intel Security study, which surveyed IT decision makers in …
Week in review: HackingTeam breach and consequences, and Android games unmasked as phishing tools
Here’s an overview of some of last week’s most interesting news and articles:Hacking Team hacked, 400GB+ of company documents and emails leakedHacking Team, the …
Why is ERP security so difficult?
ERP (Enterprise Resource Planning) security has been all over the news lately. From high profile breaches, like the recent U.S. Office of Personnel Management breach, to …
Naked pictures or financial info? Users would rather thieves stole the former
Every day it seems information security is ruling the headlines, Americans are (perhaps understandably) feeling insecure about the security of their financial information. In …
IIS 6.0 users are heading towards new security dangers
RiskIQ has discovered that 24 of the top 30 FTSE-listed companies in the UK are running web servers that will be out of support in less than a week, posing a potential …
Risk management programs lack maturity, new strategies needed
With cyber attacks and data security threats looming at insecure access points, the increased scrutiny of regulators and the focused attention of boards of directors, the …
Bitglass granted patent on searchable cloud encryption
Bitglass has been granted a patent for its searchable full-strength 256-bit AES encryption for cloud applications. The technology, covered by US Patent 9,047,480, is …
What a business leader should know about the cloud and its impact
Great companies see business risks as opportunities, and execute strategies accordingly. Such a mentality is compatible with emerging technologies. IT plays a vital role in …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations