Help Net Security
Week in review: Anthem breach, critical IE 11 bug can be used for phishing attacks
Here’s an overview of some of last week’s most interesting news and articles: Overcoming the daily challenges of a security team The institutionalization of …
How can organizations guard against hackers in 2015?
Advanced persistent threats, malware sent via attachments, direct targeting of specific users through spear phishing techniques, vulnerabilities exploited to silently deliver …
Investigating online dating fraud
The one thing that online dating scammers have in common is that their preferred target demographic is vulnerable and trusting people with a limited social circle or support …
Analysis of 2014 Microsoft patch trend data
Tripwire announced an analysis of Microsoft patch data from 2014. “The 2014 data clearly shows that Microsoft is packing in more CVEs per bulletin in 2014,” said …
Reactions to the extensive Anthem data breach
Anthem, the second-largest health insurer in the United States, has suffered a data breach that may turn out to be the largest health care breach to date, as the compromised …
IT professional, hack thyself
To anyone not living under a rock, the increasing threat of a cyber attack is very plain. IT professionals spend sleepless nights worrying that they’ll be the next …
Infographic: The state of enterprise security
This infographic by SysCloud features cyber security trends in the enterprise and showcases how data breaches in the enterprise can be prevented. Click on the image below for …
Five key IT security trends for 2015
Here’s a look at five key IT security trends and solutions for 2015. Rise in security breaches The current high level of security breaches, from the largest organization …
The real challenge of the Internet of Things
More than 40 percent of organizations expect the Internet of Things (IoT) to transform their business or offer significant new revenue or cost-savings opportunities in the …

RSA Conference 2015: Challenging today’s security thinking
RSA Conference, the premiere series of global events, will once again set the stage for the world to talk – and challenge – information security trends for 2015, …
Who are the role models in cyberspace?
Those of us of who are of a certain age learned how to live our life by playing with our toys—our cars, dolls and, of course, Star Wars action figures. We were surrounded by …
Multi-factor authentication market will be worth US$1.6 billion by the end of 2015
ABI Research found that the global mobile multi-factor authentication software and service market will be worth US$1.6 billion by the end of 2015. Username and passwords have …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations