Help Net Security
A look at emergent threats and their influence
Analyzing Dell data sources and the 2014 threat landscape, their new report found a surge in point-of-sale (POS) malware, increased malware traffic within encrypted (https) …
Cloud security: CA conducts advanced research
CA Labs is conducting research and development for innovative solutions to address security challenges in multi-cloud environments. Horizon 2020 awarded a contract to the …
CoinVault ransomware: Retrieve data without paying the criminals
Victims of the CoinVault ransomware have a chance to retrieve their data without having to pay the criminals, thanks to a repository of decryption keys and a decryption …
New security requirements for payment card vendors
The PCI Security Standards Council (PCI SSC) has published version 1.1. of its PCI Card Production Security Requirements. The updated standard helps payment card vendors …
Are privileged users the most dangerous insider?
92 percent of healthcare IT decision makers reported that their organizations are either somewhat or more vulnerable to insider threats, and 49 percent felt very or extremely …
Phishers increasingly target banks and ISP accounts
Phishing against banks and ISPs rose markedly compared to other sectors in the third quarter of 2014, according to the APWG. The number of brands being attacked remains high, …
Simda botnet taken down in global operation
The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation. In a series of simultaneous actions around the …
Man gets 150 months in prison for selling stolen and counterfeit credit cards
A member of the identity theft and credit card fraud ring known as Carder.su was sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards over …
Week in review: Apple closes OS X backdoor, cyber crooks go after enterprise millions, and what happens to data after a breach
Here’s an overview of some of last week’s most interesting news and articles: How to protect from threats against USB enabled devices USB can be an effective and …
Test your cybersecurity knowledge and decision-making skills
CIOs have watched data security rise on their list of priorities as the number of sophisticated, targeted cyberattacks continue to escalate. To educate audiences who are …
Preventing and detecting insider threats
SANS surveyed 772 IT security professionals regarding their experiences preventing and detecting insider threats within their organizations. Although 74 percent are concerned …
DARPA to create software systems that last 100 years
As modern software systems continue inexorably to increase in complexity and capability, users have become accustomed to periodic cycles of updating and upgrading to avoid …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations