Help Net Security
Windows Live ID scam targets personal information
Kaspersky Lab experts are warning of a new scam that uses Windows Live ID as bait to catch personal information stored in user profiles on services like Xbox LIVE, Zune, …
Malware upsurge threatens millions of POS devices
Notable brands like Target, Neiman Marcus, PF Changs, Staples, Michaels Stores, and Home Depot have all have become victims of point of sale (POS) security breaches targeting …
Most organizations value threat intelligence sharing
94% of respondents to an Enterprise Strategy Group (ESG) study believe it is highly or somewhat valuable to share threat intelligence information between federal agencies and …
Companies stay vulnerable to web attacks for far too long
While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to …
The rise in false fraud alerts
68% of Americans who have received a fraudulent activity alert from their credit or debit card issuer have received at least one alert in error, according to …
Can you afford to wait 197 days to detect a threat?
Financial services and retail organizations agree, advanced threats are the most serious security challenge facing their organizations, shows a new Ponemon Institute study. …
New UK law says GCHQ agents cannot be prosecuted for hacking
In a job posting published last week, the Government Communications Headquarters (GCHQ) – the UK version of US’ National Security Agency – openly announced …
The cybersecurity domino effect
RedSeal unveiled its survey of high-ranking executives that illustrates widespread concern regarding the potential effects of cyberattacks in corporate America.Most of the …
The importance of good threat intelligence
The cyber-threats our organizations face are continuing to evolve, partly in respect to the broadening motivations behind attacks, and partly due to the increased …
Secure smart devices for the holiday season
Summer is almost here and many are currently considering taking their beloved smart devices with them on their travels. However, the risks of doing so are sizeable.With a …
There’s no security without trust
Trust. It’s a small word but it conveys a lot. To many it is the cornerstone of security, because without trust there can be no security. To operate securely in the online …
Week in review: VENOM bug, infosec and ethics, and flawed crypto endangers smart grid devices
Here’s an overview of some of last week’s most interesting news, podcasts and articles:IoT and the great data heistWith the introduction of new mobile devices in …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)