Help Net Security
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Researchers aim to improve code patching in embedded systems
Three Purdue University researchers and their teammates at the University of California, Santa Barbara and Swiss Federal Institute of Technology Lausanne have received a DARPA …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
Online fraud against businesses drops, increases against consumers during reopening
Fraudsters are decreasing their schemes against businesses, but increasing COVID-19 focused scams against consumers online, according to TransUnion. Fraudsters less targeting …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093341/crypto-coin-400x200.jpg)
New AI algorithm to detect cryptocurrency miners as they steal power
Computer scientists have developed a new artificial intelligence (AI) system that may be able to identify malicious codes that hijack supercomputers to mine for cryptocurrency …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27090527/ransomware-yellow-400x200.jpg)
Three places for early warning of ransomware and breaches that aren’t the dark web
For better or worse, a lot of cybercrime sleuthing and forecasting tends to focus on various underground sites and forums across the deep and dark web corners of the Internet. …
![SSD](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095813/SSD2-400x200.jpg)
PinK: A new way of implementing a key-value store in SSDs
As web services, cloud storage, and big-data services continue expanding and finding their way into our lives, the gigantic hardware infrastructures they rely on–known …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/11111202/lock-400x200.jpg)
New attack vectors make securing virtual companies even more challenging
As organizations are settling into long-term remote working, new attack vectors for opportunistic cyberattackers—and new challenges for network administrators have been …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104929/iot-400x200.jpg)
The evolution of IoT asset tracking devices
Asset tracking is one of the highest growth application segments for the Internet of Things (IoT). According to a report by ABI Research, asset tracking device shipments will …
![SourMint](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/24144140/sourmint-bomb-400x200.jpg)
Malicious iOS SDK breaches user privacy for millions
Researchers discovered a malicious functionality within the iOS MintegralAdSDK (aka SourMint), distributed by Chinese company Mintegral. Functional flow of a user ad-click …
![secure](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111740/secure-400x200.jpg)
Protect your organization in the age of Magecart
The continuing wave of attacks by cybercriminal groups known under the umbrella term Magecart perfectly illustrates just how unprepared many e-commerce operations are from a …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
COVID-19 impact on digital transformation, cloud and security strategies
Half a year into the shutdown, companies are still playing catch up to optimize their remote work experience, according to Infoblox. Survey findings are based on 1,077 …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101705/cloud-400x200.jpg)
How can companies avoid the risks of unexpected expenses related to cloud migration?
As companies shift to remote work and move business operations online because of the spread of COVID-19, they are increasingly relying on cloud services. Unexpected expenses …
![server](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100814/server-400x200.jpg)
Researchers develop a process to categorize massive datasets, making data more accessible
A computer science professor at The University of Texas at Arlington is working with researchers to develop a process by which data points in multiple graph layers of massive …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege