Help Net Security
Why enterprise security priorities don’t address the most serious threats
In 2015, enterprises will spend more than $71.1 billion on information security – more than they have ever spent before, according to Gartner Group figures. Yet, the incidence …
Global action takes down Darkode cybercriminal forum
This week, law enforcement and judicial authorities worldwide have taken down the most prolific English-speaking cybercriminal forum to date: Darkode.In an international …
SanDisk unveils new wireless flash drive
SanDisk unveiled a new wireless mobile flash drive, the SanDisk Connect Wireless Stick, which enables sharing, transferring and accessing data between mobile devices and …
Coalition for Responsible Cybersecurity fights proposed export control regulations
A broad cross-section of industry announced the formation of the Coalition for Responsible Cybersecurity. The purpose of the Coalition is to prevent the Commerce Department …
Employees embrace BYOD, but still worry about privacy
The findings of a new survey from Tyntec, based on responses from Spain, the UK and US, reveal sluggish adoption of BYOD policies by organizations, while its employees voice …
Unsharing in the sharing economy
It’s been a big year for the sharing economy. Numerous consumer services have skyrocketed to popularity by basing their business on the sharing of resources. Companies like …
TeslaCrypt 2.0 makes it impossible to decrypt affected files
“Kaspersky Lab has detected curious behavior in a new threat from the TeslaCrypt ransomware encryptor family. In version 2.0 of the Trojan notorious for infecting …
High severity Internet Explorer 11 vulnerability identified after Hacking Team breach
After analyzing the leaked data from last week’s attack on Hacking Team, Vectra researchers discovered a previously unknown high severity vulnerability in Internet …
The difficult task of meeting compliance needs
Compliance is a complex issue in many industries and organizations know all too well that there are major fines and potential punishments for not meeting the laws and …
3 ways to stop insider threats in your organization
No one wants their organization to be the next poster child for a major informational breach. No one wants their company to make headlines for having their data compromised or …
Identifying the five principal methods of network attacks
Companies are underestimating the risk of failing to provide security training to non-technical staff.A new Intel Security study, which surveyed IT decision makers in …
Week in review: HackingTeam breach and consequences, and Android games unmasked as phishing tools
Here’s an overview of some of last week’s most interesting news and articles:Hacking Team hacked, 400GB+ of company documents and emails leakedHacking Team, the …
Featured news
Resources
Don't miss
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI