Help Net Security
Data security in the payments ecosystem
Experian Data Breach Resolution and the Ponemon Institute asked professionals to weigh in on several topics including who should be responsible for securing payment systems …
Rapid7 acquires NT OBJECTives, offers web app scanning
Rapid7 has acquired NT OBJECTives (NTO), expanding Rapid7’s Threat Exposure Management offering to further meet the needs of business infrastructures.NTO’s application …
Week in review: Researchers hack surgery robot, 5-year-old malware turns Linux servers into spamming machines
Here’s an overview of some of last week’s most interesting news, podcasts and articles:The invasion of biometricsDepending on where you stand biometrics is a good …
CTO insights: Defending your organization from insider attacks
If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received …
Infosec: Don’t fear the word
Are these words too difficult for you? Basilisk, snuffleupagus, supercalifragilisticexpialidocious, Quidditch, Oompa Loompa. I hope not! They’re all part of the magical world …
C-level executives are less confident than their boards or IT execs
A new Dimensional Research study examined corporate executives’ view of cybersecurity risks, as well as measured their confidence and preparedness in the event of a security …
How secure are digital transactions?
The online payment industry was exposed to a slew of attacks in 2013-14, with hackers meticulously examining the payment infrastructure to exploit potential weaknesses. To …
Impact of new data protection legislation not widely understood
Almost a third of public and private sector professionals are not aware of what the forthcoming EU General Data Protection Regulation (GDPR) will mean to them or their …
Chrome extension protects your Google account from phishers
Google developers have created Password Alert, an open source Chrome extension that aims to prevent users from entering their Google password in a phishing site or, …
93% of DDoS attacks last 30 minutes
As the tide of DDoS attacks continues to expand, the rise of the Internet of Things (IoT) and the influx of network connected devices, such as webcams and routers, are leading …
Unpatched, vulnerable PDF readers leave users open to attack
Unpatched, vulnerable PDF readers are a big security issue for private PC users, according to Secunia. 14% of PC users in the US (up from 12.9% last quarter) have an unpatched …
Threats on government networks remain undetected for 16 days
Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected – hiding in plain sight.The good …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted