Help Net Security
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094615/week_in_review2-400x200.jpg)
Week in review: FireEye breach, vulnerable TCP/IP stacks, Kali Linux and the future of pentesting
Here’s an overview of some of last week’s most interesting news and articles: FireEye breach: State-sponsored attackers stole hacking tools U.S. cybersecurity …
![CPRA](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/12180431/cpra-usa-400x200.jpg)
CPRA hints at the future of cybersecurity and privacy
One of the most notable ballot propositions impacting the privacy and cybersecurity world during the US 2020 election was the passage of the California Privacy Rights Act …
![build](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100100/build-400x200.jpg)
2021 predictions: The rise of cyber resilience
Each year seems to come with more cyber threats, “bad actors,” ransomware and data breaches. The security industry is on fire right now with technology providers continuing to …
![COVID-19](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/07134313/covid-19-mask-400x200.jpg)
40% of COVID-19 contact tracing apps lack basic protections
Guardsquare announced the release of a report which reassesses the levels of security protections and privacy risks of COVID-19 contact tracing apps. The report found that of …
![Joerg Appenzeller computer chip](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08163049/transistors-2d-materiallo-400x200.jpg)
Engineers design transistor that disguises key computer chip hardware from hackers
A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …
![road sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111958/road_sign-400x200.jpg)
Most IT decision makers don’t trust data, but 54% still use it to make decisions
77% of IT decision makers (ITDMs) don’t completely trust the data within their organization for timely and accurate decision making, according to SnapLogic. With 98% of those …
![cyber insurance](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08133531/cyber_insurance-yellow-400x200.jpg)
How do I select cyber insurance for my business?
There has been a 70%+ increase in the average cost of a cybercrime to an organization over five years to $13mn and a 60%+ increase in the average number of security breaches, …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
2020 to reach vulnerability disclosure levels similar to those in 2019
The number of vulnerability disclosures is back on track to reach or bypass 2019 as we head into 2021, according to Risk Based Security. The team aggregated 17,129 …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101407/user-400x200.jpg)
Researchers expose the stress levels of workers at different job positions
A Unify Square survey unveils key perspectives of enterprise employees on workplace collaboration and communication in the midst of the global pandemic. Findings highlight …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Unsophisticated fraud attacks increase, first-time fraudsters more prevalent
The risk of identity fraud has increased significantly with attacks occurring more frequently since the start of the pandemic, Onfido reveals. Over the past 12 months, the …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094431/open-400x200.png)
Open source contributors spending no time on security
The Linux Foundation’s Open Source Security Foundation (OpenSSF) and the Laboratory for Innovation Science at Harvard (LISH) announced the release of a report which details …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
Industrial pros looking for a more focused approach to digital transformation
A highly focused approach to digital transformation is challenging the traditional top-down, all-or-nothing strategy, according to a report from Plutoshift. The findings …