Help Net Security
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
The rise of ransom hacks, and the potential impact on your business
The percentage of companies reporting financially motivated cyber attacks has doubled over the past two years, with 50% of companies experiencing a cyber attack motivated by …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104929/iot-400x200.jpg)
Internet of Things security issues bleed into 2018
In 2017 Internet of Things (IoT) devices rose to prominence as attackers have continued to target and use them to support various cyberattacks. IoT devices are almost the …
![Gemalto - cloud adoption](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102150/cloud_adoption_gemalto-400x200.jpg)
As the cloud’s popularity grows, so does the risk to sensitive data
While the vast majority of global companies (95%) have adopted cloud services, there is a wide gap in the level of security precautions applied by companies in different …
![Waterfall ebook](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102146/waterfall_ebook_rail-400x200.jpg)
eBook: 5 emerging rail cybersecurity standards
This eBook is no longer available. With massive capital investments in rail infrastructure and technology, many countries understand that it’s time cybersecurity standards …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105020/hands-400x200.jpg)
The role of trust in security: Building relationships with management and employees
Massive data breaches have become the new reality, and they confirm that one of the biggest challenges companies face when it comes to security: a company’s biggest …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
CISOs are feeling less confident than ever about cyber risk and data security
Chief Information Security Officers are feeling less confident than ever about cyber-risk and data security this year, according to a survey conducted by Ponemon Institute in …
![Visa](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102154/visa-fingerprint-400x200.jpg)
On-card biometric for contactless payments tested in first commercial pilots
Visa has initiated pilots with Mountain America Credit Union and Bank of Cyprus of a new EMV dual-interface (chip- and contactless-enabled) payment card, making these the …
![abstract broken connections](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113050/abstract-broken-connections-400x200.jpg)
Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection
Here’s an overview of some of last week’s most interesting news and articles: CBP releases new guidelines on phone, laptop searches at US borders The US Customs …
![F-Secure Intel AMT](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102200/fsecure-intelamt-400x200.jpg)
Intel AMT security issue gives attackers complete control over a laptop
F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows …
![healthcare professionals](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102209/healthcare-professionals-400x200.jpg)
One in five healthcare pros have experienced patient data breaches
According to a recent University of Phoenix College of Health Professions online survey of 504 registered nurses and administrative staff, only a quarter of registered nurses …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102220/bulb-400x200.jpg)
Strong security simplifies compliance for French operators of vital industry
In 2014, France’s National Agency for the Security of Information Systems, or ANSSI, issued two detailed cybersecurity guidance documents for Industrial Control Systems: …
![Embedi IOActive research](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102217/embedi-ioactive-400x200.jpg)
Researchers uncover major security vulnerabilities in ICS mobile applications
IOActive and Embedi researchers found 147 cybersecurity vulnerabilities in 34 mobile applications used in tandem with SCADA systems. Proof-of-concept Attack on Victim HMI …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes