Help Net Security
Breach detection: Five fatal flaws and how to avoid them
When the Sarbanes-Oxley Act of 2002 was passed, it fell on corporate security teams to translate its requirements into technical controls. That threw the IT Security function …
Solving the cybersecurity challenges of smart cities
Backed by leading IT security researchers, companies and organizations, including IOActive, Kaspersky Lab, Bastille, and the Cloud Security Alliance, the global Securing Smart …
How businesses can stem the flow of leaky data
The privacy and security of corporate data is at risk like never before. Not only are businesses faced with an ever-growing variety of security threats, from sophisticated, …
Internet of Things: Whose data is it, anyway?
Everywhere you look, it seems to be that everything is becoming “smart”. On my wrist, I frequently wear a smart watch that monitors how many steps I take, what my heart rate …
Why insider threats are succeeding
Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or …
15,000 spam emails have hit the inboxes of Android users in recent days
“Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware that demands $500 to restore …
Sniffing and tracking wearable tech and smartphones
Researchers at Context Information Security have demonstrated how easy it is to monitor and record Bluetooth Low Energy signals transmitted by many mobile phones, wearable …
Travel smart: Tips for staying secure on the road
Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your …
Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles:European Internet users urged to protect themselves against …
Windows Live ID scam targets personal information
Kaspersky Lab experts are warning of a new scam that uses Windows Live ID as bait to catch personal information stored in user profiles on services like Xbox LIVE, Zune, …
Malware upsurge threatens millions of POS devices
Notable brands like Target, Neiman Marcus, PF Changs, Staples, Michaels Stores, and Home Depot have all have become victims of point of sale (POS) security breaches targeting …
Most organizations value threat intelligence sharing
94% of respondents to an Enterprise Strategy Group (ESG) study believe it is highly or somewhat valuable to share threat intelligence information between federal agencies and …
Featured news
Resources
Don't miss
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted
- Identifying high-risk APIs across thousands of code repositories