Please turn on your JavaScript for this page to function normally.
Which security investments make a difference?

Costly cyber attacks are having a significant and growing financial impact on businesses worldwide. According to Accenture and the Ponemon Institute, in 2017 the average cost …

biohazard
Healthcare sector reports greatest number of security incidents

McAfee Labs saw healthcare surpass public sector to report the greatest number of security incidents in Q2, while the Faceliker Trojan helped drive quarter’s 67% increase in …

Skull
Shocker? Companies still unprepared to deal with ransomware

Companies and government agencies are overwhelmed by frequent, severe ransomware attacks, which have now become the #1 cyber threat to organizations, according to Crowd …

Showtime
Showtime’s Web sites roped visitors’ CPU into mining cryptocurrency

Here’s the latest good reason for users to block JavaScript: if you don’t, your computer’s CPU power could be used to mine cryptocurrency without your …

finance biohazard
XPCTRA financial malware leaves no stone unturned

A Trojan that has previously been only stealing users’ banking credentials has been modified to do much more than that. This new variant, dubbed XPCTRA, can also steal …

Door
Sophisticated threats? It’s usually the basic ones that get you

To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. …

vectors
Three out of four DDoS attacks target multiple vectors

Three out of every four DDoS attacks employed blended, multi-vector approaches in the second quarter of 2017, according to Nexusguard. Distribution of DDoS attack vectors The …

macOS High Sierra
macOS High Sierra is now available

Apple macOS High Sierra is now available as a free update from the Mac App Store, and it supports all Macs introduced in late 2009 or later. Apple File System (APFS) APFS is a …

Deloitte
Industry reactions to the Deloitte cyber attack

Deloitte has been targeted in an attack that compromised the emails and plans of some of its clients. Here are some of the industry comments Help Net Security received …

Phone unlock pattern
Android unlock patterns are a boon for shoulder surfing attackers

The “swiping” unlock patterns typical for Android devices are considerably easier for attackers to discern than PIN combinations. In fact, after only one …

icosahedral
Cyber threat analysis in complex adaptive systems

The use of wartime analogies in cybersecurity is common in our industry. Sun Tzu is often quoted in presentations and papers to emphasize an author’s key point. I will spare …

DDoS
Large DDoS attacks over 50 Gbps have quadrupled between 2015 and 2017

Organizations are experiencing an increase in the magnitude of DDoS attacks, with the average size of attacks over 50 Gbps quadrupling in just two years, according to A10 …

Don't miss

Cybersecurity news