Help Net Security
US ICS operators under attack by crims wielding BlackEnergy malware
The US ICS-CERT has issued a warning about an ongoing sophisticated malware campaign that has hit a number of industrial control systems (ICSs) environments using a variant of …
10% of employees unaware if they have an IT department or not
A transatlantic survey of 2000 employees has found that only a fifth of UK workers think their data is more secure at work than at than at home, whereas the majority of US …
IT is losing the battle on security in the cloud
A majority of IT organizations are kept in the dark when it comes to protecting corporate data in the cloud, putting confidential and sensitive information at risk. This is …
Fixing the broken windows of software security
Last month I discussed how we can fix software security issues only by making sure we use libraries and frameworks that don’t allow classes of vulnerability to exist. Of …
Russian-based cyber spies going after military, intelligence targets
FireEye today released a comprehensive intelligence report that assesses that an advanced persistent threat (APT) group may be sponsored by the Russian government. The report …
246 percent spike in Apple-themed phishing scams
Phishing scams targeting Apple users saw a dramatic upswing in Q3 of this year. Compared to Q1 2014, Apple users faced a 246% increase in the attacks that masquerade as a …
Top 10 cloud myths
Cloud computing is uniquely susceptible to the perils of myths due to the nature, confusion and hype surrounding it, according to Gartner, Inc. These myths slow things down, …
Cyber security coalition reports on Chinese state-sponsored espionage
Novetta Solutions released multiple reports, the main one being titled “Operation SMN: Axiom Threat Actor Group Report”, which details the characteristics of a …
IBM’s Big Data analytics solution to uncover criminal cyber activity in seconds
IBM announced new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate …
Automation is the key to successful policy implementation
Organizations today are facing increased pressure to collect and store massive amounts of data. Regulatory guidelines, storage costs, and the promise of Big Data have …
APWG launches global cybercrime reporting program
The Anti-Phishing Working Group (APWG) announced the establishment of an open-access cybercrime reporting program to speed the collection and redistribution of cybercrime …
RBS WorldPay hack ringleader finally sentenced
Nearly five years after the day he was indicted, Sergei Nicolaevich Tsurikov has finally been sentenced for conspiracy to commit wire fraud and computer intrusion for his …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits