Help Net Security
Phishers increasingly target banks and ISP accounts
Phishing against banks and ISPs rose markedly compared to other sectors in the third quarter of 2014, according to the APWG. The number of brands being attacked remains high, …
Simda botnet taken down in global operation
The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation. In a series of simultaneous actions around the …
Man gets 150 months in prison for selling stolen and counterfeit credit cards
A member of the identity theft and credit card fraud ring known as Carder.su was sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards over …
Week in review: Apple closes OS X backdoor, cyber crooks go after enterprise millions, and what happens to data after a breach
Here’s an overview of some of last week’s most interesting news and articles: How to protect from threats against USB enabled devices USB can be an effective and …
Test your cybersecurity knowledge and decision-making skills
CIOs have watched data security rise on their list of priorities as the number of sophisticated, targeted cyberattacks continue to escalate. To educate audiences who are …
Preventing and detecting insider threats
SANS surveyed 772 IT security professionals regarding their experiences preventing and detecting insider threats within their organizations. Although 74 percent are concerned …
DARPA to create software systems that last 100 years
As modern software systems continue inexorably to increase in complexity and capability, users have become accustomed to periodic cycles of updating and upgrading to avoid …
Worldwide IT spending to decline in 2015
Worldwide IT spending is set to shrink to $3.66 trillion in 2015, a 1.3 percent decrease from 2014, according to the latest forecast by Gartner. “We forecast …

Alec Baldwin to deliver closing RSA Conference 2015 keynote
Television and film star Alec Baldwin will be part of the closing ceremonies for RSA Conference 2015 taking place on Friday, April 24th in San Francisco, CA. Celebrated as one …
MitM, DoS bugs in Network Time Protocol squashed
Two vulnerabilities affecting Network Time Protocol (NTP), which is used for synchronizing clocks of computer systems, have been patched and made available in the latest …
Polymorphic Beebone botnet sinkholed in international police operation
On April 8, a global operation targeted the Beebone (also known as AAEH) botnet, a polymorphic downloader bot which installs various forms of malware on victims’ …
The need for end-user visibility in a Bring Your Own Anything environment
Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted