Help Net Security
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100701/chess-400x200.jpeg)
Confidence wavers in face of evolving cybersecurity threats
Webroot found that businesses in the U.S., U.K. and Australia are taking cybersecurity seriously – with almost 100 percent of respondents conducting some form of employee …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
How criminals abuse IDNs to conduct malicious activities
New research from Farsight Security examines the prevalence and distribution of IDN lookalike domain names, also called homographs, over a 12-month period with a focus on 466 …
![vintage computer](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100707/vintage-computer-400x200.jpeg)
IT chiefs keep obsolete systems running just to keep data accessible
89 per cent of IT decision makers in UK enterprises admit they are keeping old or legacy applications alive just to keep the historical data accessible, according to a new …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105003/wifi-400x200.jpg)
WPA3: Next generation of Wi-Fi security now available
Wi-Fi Alliance introduced Wi-Fi CERTIFIED WPA3, the next generation of Wi-Fi security, bringing new capabilities to enhance Wi-Fi protections in personal and enterprise …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105254/ddos_attacks-400x200.jpg)
Bot-driven credential abuse, DDoS attacks continue to rise
Cybersecurity defenders face increasing threats from organisations in the form of bot-based credential abuse targeting the hospitality industry and advanced DDoS attacks, …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105023/architecture-400x200.jpg)
Managing and maintaining security in the enterprise
In the digital age, more often than not, organizations are playing defense against cybercrime. In fact, a report from Online Trust Alliance shows businesses reported 159,700 …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100716/hand-400x200.jpg)
Digital transformation: Insight into getting it right
If digital transformation (DX) is using digital technologies to create new business models and change markets, then the journey has only just begun, according to IDC. The …
![Ocean's Eleven](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100730/oceans-eleven-400x200.jpg)
Has your security evolved to counter Ocean’s Eleven of threat scenarios?
In assessing how the cyber threat and mitigation landscape has evolved over time, I often think of the ways that “cops and robbers” movies have changed: In the old days, a …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Worldwide cloud IT infrastructure revenues continue to grow
Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 45.5% year over year in the …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194930/abstract3-400x200.jpg)
Week in review: Threat modeling, blockchain and security, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Cisco plugs critical flaws in many switches, security appliances Cisco has released …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101457/biohazard-400x200.jpg)
Why cybercriminals are turning to cryptojacking for easy money
The cryptocurrency market has seen an incredible amount of attention and hype over the last year, culminating with Bitcoin values soaring by more than 1,300 percent in 2017. …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Banking Trojans and cryptojacking on the rise
A new report analyzes threat data collected from approximately 750,000 Morphisec protected endpoints globally, between January 1 and March 31, 2018, as well as from in-depth …
Featured news
Sponsored
Don't miss
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)
- Review: Action1 – Simple and powerful patch management