searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

user risk

Get our top stories in your inbox

Which users are at higher risk of email-based phishing and malware?

February 11, 2021

The risk of being targeted with email-based phishing and malware attacks is not evenly spread across geographic and demographic boundaries, Google and Stanford University …

Google offers high-risk Chrome users additional scanning of risky files

September 18, 2020

Google is providing a new “risky files” scanning feature to Chrome users enrolled in its Advanced Protection Program (APP). About the Advanced Protection Program …

State-sponsored actors may have abused Twitter API to de-anonymize users

February 4, 2020

A Twitter API that’s intended to help new account holders find people they may already know on Twitter has been abused by known and unknown actors to tie usernames to …

Could lighting your home open up your personal information to hackers?

October 25, 2019

Earlier this year Amazon’s Echo made global headlines when it was reported that consumers’ conversations were recorded and heard by thousands of employees. Now …

How to write an effective data breach notification?

May 23, 2019

Data breach notifications sent by companies to affected customers are often unclear and not very helpful, University of Michigan researchers have found. The problem(s) The …

Employees are aware of USB drive security risks, but don’t follow best practices

May 15, 2019

Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by …

Users are too confident in their protection from threats

March 6, 2019

Most users care about online privacy and take some steps to make sure their data is protected, a new Malwarebytes survey has revealed. But some protection measures are too …

Azure AD Identity Protection now revolves around risky users and risky sign-ins

February 15, 2019

Launched in September 2018, Microsoft Threat Protection (MTP) integrates a number of Microsoft services to provide a fully integrated, end-to-end solution for securing the …

bot

Proliferation of sneakerbots across industries: The long tail of DIY bot operators

  • Preparing for the Cybersecurity Maturity Model Certification onslaught
  • Protecting the digital workplace with an integrated security strategy
Free certification Exam Action Plan from (ISC)²

What's new

linux tux

Now-fixed Linux kernel vulnerabilities enabled local privilege escalation (CVE-2021-26708)

Microsoft Exchange

Exchange Servers targeted via zero-day exploits, have yours been hit?

10 CISO strategies

10 strategies small security teams can use for effective cybersecurity management

work from home

Enterprises observing uptick in risky behaviors since shift to remote work

Don't miss

Microsoft Exchange

Exchange Servers targeted via zero-day exploits, have yours been hit?

bot

Proliferation of sneakerbots across industries: The long tail of DIY bot operators

10 CISO strategies

10 strategies small security teams can use for effective cybersecurity management

puzzle

Preparing for the Cybersecurity Maturity Model Certification onslaught

malware

Multi-payload Gootloader platform stealthily delivers malware and ransomware

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • How do I select a cloud security solution for my business?
  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise