Help Net Security
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
How safe is your personal information?
Another day, another data breach. Recent news about cybercriminals obtaining more than 5 million credit card numbers from high-end U.S. retailers joined a series of major …
![Pen Test Metrics 2018](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101435/pen_test_metrics_2018-400x200.jpg)
Report: What two years of real pen testing findings will tell you
The information included in this report (Time to Fix, Vulnerability Types, Findings Criticality, Issues Fixed) is summary data from all of the penetration tests Cobalt …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195645/Bitcoin-400x200.jpg)
Using biometrics to protect crypto currency
The rise of crypto currency is something that investors have monitored closely. Whether Bitcoin, Zcash or Ripple, the rise of this digital currency is here to stay. With this …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102115/earth-400x200.jpg)
Are legacy technologies a threat to EU’s telecom infrastructure?
Telecommunications is a key infrastructure based on how our society works. It constitutes the main instrument that allows our democracy and our EU core values such as freedom, …
![doctor](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111351/doctor-400x200.jpg)
Most healthcare pros believe their organizations adequately protect patient data
Most of the healthcare professionals polled remain confident regarding their own organization’s cyber security protocols despite apprehensions connected with their own …
![success](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113141/success-400x200.jpg)
Secure software development practices for developers, organizations and technology users
SAFECode announced today the publication of the Fundamental Practices for Secure Software Development: Essential Elements of a Secure Development Life Cycle Program (Third …
![RSA Conference](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101445/rsac-crowd-400x200.jpg)
RSAC onDemand: A new way to experience RSA Conference
RSA Conference announced the addition of RSAC onDemand to its RSAC AdvancedU education program. AdvancedU at RSA Conference is a series of programs that teaches …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Week in review: Hacking intelligent buildings, trust in critical systems under attack
Here’s an overview of some of last week’s most interesting news and articles: The current state of USB data protection The vast majority of employees rely on USB …
![crowd](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101452/crowd-400x200.jpg)
Are there too many cybersecurity companies?
The most potent global threat in 2018 may not be armed conflict or civil unrest, but cybersecurity. While cybersecurity awareness has increased with high profile breaches in …
![crypto currency](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101455/crypto_currency2-400x200.jpg)
Crypto mining runs rampant in higher education: Is it students?
The higher education sector exhibited a startling increase in potentially damaging cryptocurrency mining behaviors, according to Vectra. The Attacker Behavior Industry Report …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101457/biohazard-400x200.jpg)
Macro-less word document attacks on the rise
WatchGuard released its Internet Security Report for Q4 2017. Among the report’s most notable findings, threat intelligence showed that total malware attacks are up by …
![USB](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110808/usb-400x200.jpg)
The current state of USB data protection
Data protection, whether related to personal customer or patient information, is critical across virtually all industries. So how can organizations best protect their most …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes