Help Net Security
![world danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101905/world-danger-400x200.jpg)
Credential phishing kits target victims differently depending on location
There is a new attack vector in town – the customization of phishing kits. In a recent case uncovered by PhishMe Intelligence, a phishing kit was crafted to target …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194817/email-1-400x200.jpg)
99 percent of domains are not protected by DMARC
Essentially every global domain is vulnerable to phishing and domain name spoofing. A new report incorporates data from Agari, revealing that 90 percent of its customers have …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103547/general-400x200.jpg)
IT ops and engineering are embracing automation to increase business agility
Based on a survey of nearly 700 engineering and operations individuals globally, a report by Indeni and GNS3 reveals a programming knowledge gap that is having an impact on …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
2017 was extraordinary: 5,200 breaches exposed 7.8 billion records
Once again, the record has been broken for both the most breaches and the most data compromised in a year. There were 5,207 breaches recorded last year, surpassing 2015’s …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101915/person-400x200.jpg)
Identity fraud enters a new era of complexity
The number of identity fraud victims increased by eight percent (rising to 16.7 million U.S. consumers) in the last year, a record high since Javelin Strategy & Research …
![People](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104532/people-400x200.jpeg)
Why developing an internal cybersecurity culture is essential for organizations
ENISA published a report providing organisations with practical tools and guidance to develop and maintain an internal cybersecurity culture. Understanding the dynamics of …
![cloud storage](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102525/cloud_storage-400x200.jpg)
Cloud service adoption creates new data center demands
Both consumer and business applications are contributing to the growing dominance of cloud services over the Internet, according to the Cisco Global Cloud Index (2016-2021). …
![technology](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105415/technology-400x200.jpg)
Data and analytics maturity: Most organizations should be doing better
91 percent of organizations have not yet reached a transformational level of maturity in data and analytics, despite this area being a number one investment priority for CIOs …
![British Pound](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101931/british_pound-400x200.jpeg)
UK data protection authority issues record fines
Since August 2015, The UK’s independent authority, The Information Commissioner’s Office, has fined 104 organisations a total of £8.7 million for breaches in data …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101936/spotlight-400x200.jpeg)
8 trends in government tech for an enterprise-focused approach to IT
Deloitte examined emerging trends in government technology, and highlighted eight trends that are shaping strategic and operational transformations and redefining IT’s …
![Europol](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110453/europol-400x200.jpg)
Investigation uncovers Luminosity Link RAT distributors, victims are in the thousands
A hacking tool allowing cybercriminals to remotely gain complete control over a victim’s computer is no longer available as a result of an UK-led operation targeting hackers …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195645/Bitcoin-400x200.jpg)
The new gold rush: A look inside cryptocurrency fraud
Cybercriminals are flooding to the new world of cryptocurrencies looking to exploit the boom in interest and adoption of these electronic currencies, according to Digital …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes