Help Net Security
Guidelines on the auditing framework for Trust Service Providers
A new ENISA report provides guidelines on the auditing framework for Trust Service Providers (TSPs). These guidelines can be used by TSPs (preparing for audits) and Conformity …
Crypto ransomware sightings and trends for Q1 2015
It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the …
How vulnerable is our critical national infrastructure?
Considered the backbone of the nation’s economy, security and health; critical infrastructure provides power, water, transportation, and communications systems relied on …
What’s complicating your security readiness?
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment …
Don’t just deploy a backup solution and hope for the best
Employing a backup solution does not entirely eliminate data loss, according to Kroll Ontrack. The 2015 survey of customers who lost valuable computer data confirms that the …
I don’t need friends, I have followers
Admittedly, I didn’t really mean to utter those words but found them coming out of my mouth nonetheless. Well what else do you say when an eight year old ridicules you …
Consumers would sell personal information for a price
Consumers crave privacy, but do not typically alter actions to protect themselves, according to a global study conducted by the Ponemon Institute. A slight majority of …
Cyber threat intelligence: Perception and use
Most companies believe threat intelligence is essential for a well-rounded cybersecurity defense and has proven effective in stopping security incidents, according to a survey …
Companies now have 1,555 partners in the cloud
Security does not end at the corporate perimeter. After vendors served as entry points in recent high-profile breaches, security vulnerabilities associated with partners have …
How security pros deal with cybercrime extortion
1 in 3 security professionals recommend negotiating with cybercriminals for the return of stolen data or the restoration of encrypted files, according to ThreatTrack Security. …
Two feds charged for stealing Bitcoin during Silk Road investigation
Two former US federal agents have been charged with wire fraud, money laundering and related offenses for stealing digital currency during their investigation of Silk Road. …
Half of companies under DDoS attack have critical data stolen
Neustar surveyed IT professionals from across EMEA to understand the impact of DDoS attacks. 40 percent of companies estimate hourly losses of over £100,000 at peak times …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted