Please turn on your JavaScript for this page to function normally.
hands
Protecting applications against DFA attacks

2001 was an exciting time for cryptography, as the new Advanced Encryption Standard (AES) specification was finalized, making a mathematically secure and performant encryption …

containers
Businesses recognize the need for AI & ML tools in cybersecurity

71 percent of businesses surveyed in the United States plan to use more artificial intelligence and machine learning (AI/ML) in their cybersecurity tools this year, although …

European flag
Urgent need for IT security legal framework in Europe

Information transmission, transport, industrial production, research, administration – hardly any area can manage without modern information and communication …

Google Play
Researchers expose massive mobile adware and data stealing campaigns with 250 million downloads

Check Point Research has uncovered two massive mobile adware and data stealing campaigns, which have already had over 250 million downloads combined globally. Both target …

5G
Network performance requirements grow in the era of 5G: Are your security processes ready?

The new generation of 5G cellular networks are beginning to be rolled out in leading countries like the U.S., bringing to life the promise of connecting everything from …

criminal
How susceptible are hospital employees to phishing attacks?

Cybersecurity threats are a rising problem in society, especially for healthcare organizations. Successful attacks can jeopardize not only patient data but also patient care, …

Moxa EDS-405A
Exploitation of vulnerabilities in Moxa industrial switches could disrupt communication between ICS components

Positive Technologies experts Ivan Boyko, Vyacheslav Moskvin, and Sergey Fedonin have discovered multiple vulnerabilities in Moxa industrial switches in the EDS-405A, …

hands
What happened to trust and transparency in cybersecurity?

Today, we need proactive security measures that protect the organization responsibly, mitigate risk, and adapt to an ever-changing world. This can only be truly achieved with …

Capsule8
The reality of container escapes

In this Help Net Security podcast recorded at RSA Conference 2019, Brandon Edwards, Chief Scientist at Capsule8, talks about container escapes. Here’s a transcript of the …

laptop
IT managers can’t ignore endpoints because most cyberattacks start there

IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint …

risk
Hidden third-party tags could be leaving Fortune 100 companies at risk

Crownpeak found more than 1,700 tag redirectson websites belonging to companies in the Fortune 100. These hidden third-party tags leave the sites open to potential data …

iovation MFA
The impact of spear phishing on organizations and how to combat this growing threat

In this Help Net Security podcast, Scott Olson, the VP of Product Marketing at iovation, talks about the impact of spear phishing, and offers practical suggestions on how to …

Don't miss

Cybersecurity news