searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

research

Get our top stories in your inbox

Bitcoin Security Rectifier app aims to make Bitcoin more secure

May 10, 2021

A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: …

DefakeHop: A deepfake detection method that tackles adversarial threat detection and recognition

May 7, 2021

Army researchers developed a deepfake detection method that will allow for the creation of state-of-the-art soldier technology to support mission-essential tasks such as …

Researchers develop program that helps assess encryption systems’ vulnerabilities

April 30, 2021

Anastasia Malashina, a doctoral student at HSE University, has proposed a new method to assess vulnerabilities in encryption systems, which is based on a brute-force search of …

Research directions in cybersecurity to support a digital strategic autonomy

April 27, 2021

Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the EU Cybersecurity Strategy. In an effort to support this …

Scientists develop quantum machine learning methods for reasoning

April 12, 2021

Scientists at Cambridge Quantum Computing (CQC) have developed methods and demonstrated that quantum machines can learn to infer hidden information from very general …

Vulnerabilities in ICS-specific backup solution open industrial facilities to attack

April 7, 2021

Claroty researchers have found and privately disclosed nine vulnerabilities affecting Rockwell Automation’s FactoryTalk AssetCentre, an ICS-specific backup solution. All of …

MindAPI makes API security research and testing easier

April 6, 2021

Security researcher David Sopas has published a new open-source project: MindAPI, a mind map with resources for making API security research easier. “I love mind maps. …

Encrypted method that measures encounters could slow down or prevent future pandemics

April 2, 2021

When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part …

5G network slicing vulnerability leaves enterprises exposed to cyberattacks

March 24, 2021

AdaptiveMobile Security today publicly disclosed details of a major security flaw in the architecture of 5G network slicing and virtualized network functions. The fundamental …

Can private data be recovered from “sanitized” images?

March 12, 2021

Machine learning systems are becoming pervasive not only in technologies affecting our day-to-day lives, but also in those observing them, including face expression …

How to tackle modern agriculture security challenges

March 3, 2021

According to recent estimates, there will be roughly 10 billion people to feed in 2050. Agricultural production will need to increase by almost 56% to guarantee food security …

Multi-payload Gootloader platform stealthily delivers malware and ransomware

March 2, 2021

The delivery method for the six-year-old Gootkit financial malware has been developed into a complex and stealthy delivery system for a wide range of malware, including …

Posts navigation

1 2 3 4 5 6 7 8 9 … 35

Featured news

  • The challenges and advantages of building behavior-based threat detection
  • Product showcase: Group-IB Unified Risk Platform
  • How businesses are prioritizing data privacy
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

New infosec products of the week: July 1, 2022

Product showcase: Group-IB Unified Risk Platform

The challenges and advantages of building behavior-based threat detection

Infosec products of the month: June 2022

Don't miss

The challenges and advantages of building behavior-based threat detection

Product showcase: Group-IB Unified Risk Platform

Evaluating the use of encryption across the world’s top one million sites

Evolving online habits have paved the way for fraud. What can we do about it?

How businesses are prioritizing data privacy

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise