Help Net Security
![Dash](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103448/dash-400x200.jpg)
Dash invites researchers to hack their blockchain
Thousands of security researchers will be incentivized to identify critical software vulnerabilities within Dash’s code and present them to the Dash Core Team for remediation. …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Week in review: MalwareTech arrested, hacking Amazon Echo
Here’s an overview of some of last week’s most interesting news, articles and podcasts: US senators introduce bill to improve IoT security, protect researchers …
![cube](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103500/cube-400x200.jpg)
Identity-in-depth and the evolution of defense
We’ve seen it over and over again: the parade of companies and government agencies announcing the impact of their latest breach. These players have something in common that …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103503/lock-dark-400x200.jpg)
Malicious content delivered over SSL/TLS has more than doubled in six months
Threats using SSL encryption are on the rise. An average of 60 percent of the transactions in the Zscaler cloud have been delivered over SSL/TLS. Researchers also found that …
![speed](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111704/speed-400x200.jpg)
Intrusion detection is speeding up: Is it enough to tackle global cyber threats?
As criminals continue to develop new methods to break or sidestep cyber defences, in many cases the focus is shifting towards the ability to detect and respond to an incident …
![Symantec](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104654/symantec-400x200.jpg)
DigiCert to acquire Symantec’s website security business
Under the terms of the agreement, Symantec will receive approximately $950 million in upfront cash proceeds and approximately a 30 percent stake in the common stock equity of …
![award](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112832/award-400x200.jpg)
High-Tech Bridge appears in three Gartner Hype Cycles 2017
High-Tech Bridge has been identified as a Sample Vendor in the July 2017 Gartner reports “Hype Cycle for Application Services, 2017”, “Hype Cycle for Cloud …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103509/IoT-400x200.jpg)
US senators introduce bill to improve IoT security, protect researchers probing it
US Senators Mark Warner (D-VA), Cory Gardner (R-CO), Ron Wyden (D-WA) and Steve Daines (R-MT) introduced bipartisan legislation to improve the cybersecurity of …
![diver](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103516/diver-400x200.jpg)
Shark or not? 3 real-life security scenarios and how to tell which will really bite
We’ve just wrapped one of my favorite weeks of television, Shark Week. Viewers were treated to show after show of sharks stalking and attacking helpless victims. In most …
![nmap](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110432/nmap-400x200.jpg)
Nmap 7.60 released: SSH support, SMB2/SMB3 improvements, 14 more scripts
Nmap is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195157/user-400x200.jpg)
Most damaging threat vector for companies? Malicious insiders
According to a new SANS survey, 40 percent of respondents rated malicious insiders (insiders who intentionally do harm) as the most damaging threat vector their companies …
![Security](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195724/security-265130_1280-1-400x200.jpg)
Most SMBs plan to outsource IT security this year
96 percent of small- to medium-sized businesses (SMBs) in the US, UK, and Australia believe their organizations will be susceptible to external cybersecurity threats in 2017. …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage