Help Net Security
Online behaviors that increase the risk of identity theft
PrivacyGuard released the results of a survey aimed at observing and identifying a number of online behaviors that consumers willingly partake in that could put them at risk …
Week in review: Cryptolocker copycat, CyanogenMod’s built-in SMS encryption, NSA uses Google cookies to track suspects
Here’s an overview of some of last week’s most interesting news and articles: The DDoS debate: Multi-layered versus single solution There is a DDoS debate in the …
DDoS attacks escalate, businesses still unprepared
Many businesses are failing to take adequate measures to protect themselves against the threat of a DDoS attack. A Corero Network Security survey of 100 companies revealed …
Secure remote access trends
HOB announced the results of a new survey which quantifies the trends and pain points CTO’s and CIO’s in the United States experience when utilizing remote access …
Top 100 Android apps hacked in 2013
One hundred percent of the Top 100 paid Android apps and 56 percent of the Top 100 paid Apple iOS apps have been hacked, according to Arxan. As the growth in mobile innovation …
Companies embrace the cloud and BYOD, can’t control them
Cloud applications and mobile devices are increasing security and compliance risk at many US and UK enterprises. Alarmingly, the SailPoint survey reveals that while global …
One in four UK consumers have had online accounts hacked
As user engagement with ecommerce sites and online services inevitably increases in the run up to Christmas, almost a quarter (24 per cent) of UK consumers have had their …
Top security trend predictions for 2014
AppRiver released its list of the top IT security trend predictions for 2014. They predict organizations will see the following in 2014: State-sponsored attacks and cyber …
What do people want to hide on their smartphone?
More than half of Americans (52%) would be embarrassed about friends or family seeing certain files or documents on their smartphone, according to Clean Master. The number one …
How cyber squatters and phishers target antivirus vendors
Illegal online activities such as phishing and typosquatting are growing at an alarming rate. To understand the issue in detail High-Tech Bridge analyzed 946 domains that may …
Young professionals exposing workplaces to cyber attack
Low cyber-threat awareness amongst Gen-Y professionals coupled with blasé attitudes towards cyber security are leaving organizations across the country exposed to attack and …
Energy-efficient bcrypt cracking
Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)