Help Net Security
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101119/zero-400x200.jpg)
Social media: The zero-trust game
Our value today is measured in numbers. Followers, connections, likes, tweets, and impressions now count toward not only the value of our opinions but also quantify our sphere …
![ATM](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101121/atm-400x200.jpg)
ATM attacks: How hackers are going for gold
Imagine winning the lottery and having an ATM spit huge amounts of cash at you. That’s exactly what some cyber criminals are after. They’re targeting ATMs and launching …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
Organisations across the UK are still struggling with ransomware
A year after the WannaCry ransomware attack impacted an estimated 200,000 victims, new research has revealed that organisations across the UK are still struggling to deal with …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101128/people-400x200.jpeg)
Do young people hold the key to closing the cybersecurity talent gap?
The cybersecurity talent shortage is a frequently talked about. Even with the attention, the future still holds more job openings than qualified employees available to fill …
![ignore](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101125/ignore-400x200.jpg)
Too many IT pros ignore critical security issues
A recent Outpost24 survey of 155 IT professionals, which revealed that 42 percent ignore critical security issues when they don’t know how to fix them (16 percent) or don’t …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103744/GDPR-400x200.jpg)
Most financial firms still unprepared for GDPR
With only a few weeks until implementation, more than 50% of investment firms globally are unlikely to be ready for the General Data Protection Regulation (GDPR) on 25 May …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101936/spotlight-400x200.jpeg)
Half of all companies do not have adequate application security visibility
The Ponemon Institute surveyed nearly 1,400 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected …
![Arrows](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112857/choose-400x200.jpg)
Breach activity declines, number of compromised records remains high
After year over year increases in the number of reported data breaches, Risk Based Security has released the results of their Q1 2018 Data Breach QuickView Report, showing the …
![Epson AR glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101134/epson-glasses-1-400x200.jpg)
First biometric authentication solution for consumer augmented reality headsets
Redrock Biometrics and Epson have partnered to bring PalmID to the MOVERIO Smart Glasses Platform as the first biometric authentication solution for a consumer AR headset. …
![Telegram](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103838/telegram-400x200.jpg)
Cybercriminals are turning to Telegram due to its security capabilities
Check Point researchers have revealed that cybercriminals are increasingly exploiting the popular messaging app, Telegram, to exchange information, recruit new partners and …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111055/keys-400x200.jpg)
Mobile first: Security concerns and solutions
The majority of people – 83%, in fact – use their mobile devices to go online. 89% of these users connect to the internet via a mobile device every day. However, …
![iOS biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104642/ios-biohazard-400x200.jpg)
iOS users are 18x more likely to be phished than to download malware
Phishing is the number one mobile threat affecting organizations. The Wandera’s Phishing Report 2018 shows that iOS users are 18x more likely to be phished than to …
Featured news
Sponsored
Don't miss
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)