Help Net Security
![](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103511/amazon-echo-400x200.jpg)
Hackers can turn Amazon Echo into a covert listening device
New research released by MWR InfoSecurity reveals how attackers can compromise the Amazon Echo and turn it into a covert listening device, without affecting its overall …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113233/numbers-400x200.jpg)
Large corporations increasingly considering blockchain deployment
57% of large corporations are either actively considering, or are in the process of, deploying blockchain technology, according to Juniper Research. Almost 400 company …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103519/tools-400x200.jpg)
Digital transformation and IoT to drive investment in IT operations management
The growth of digital business and the Internet of Things (IoT) is expected to drive large investment in IT operations management (ITOM) through 2020, according to Gartner. A …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194215/healthcare-400x200.jpg)
Nation-states are biggest cyber threat for drug and medical device makers
Government-sponsored hackers were seen as the biggest threat to cyber security among executives in charge of technology, information, and security at drug and medical device …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110026/healthcare-400x200.jpg)
Independent labs will test the security of medical devices
The Medical Device Innovation, Safety and Security Consortium (MDISS) launched the first of more than a dozen planned specialized labs for security testing medical devices. …
![Red Hat containers](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104503/redhat_containers-400x200.jpg)
Container security: The seven biggest mistakes companies are making
As enterprises increase adoption of containers, they also risk increasing the number of mistakes they make with the technology. Given that many companies are still wrapping …
![Businessman juggling](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195417/problems-400x200.jpg)
Week in review: Black Hat, the future of AppSec, the value of cyber insurrance
Here’s an overview of some of last week’s most interesting news and articles: Review: Pwnie Express Pulse Pwnie Express Pulse is a SaaS offering that uses custom …
![structure](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103902/structure-red-400x200.jpeg)
McAfee aims to strengthen human-machine defense teams
“Today’s security teams are facing 244 new cyber threats every minute, amid a serious talent shortage. Siloed security, without automation, managed by overwhelmed teams is not …
How to protect the power grid from low-budget cyberattacks
Cyberattacks against power grids and other critical infrastructure systems have long been considered a threat limited to nation-states due to the sophistication and resources …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111635/danger-400x200.jpg)
Threat prevention for protecting production environments
Capsule8 launched the beta version of Capsule8 Protect, a threat prevention and response platform purpose-built for cloud-native environments. Organizations are rapidly …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104216/phishing-400x200.jpg)
Phishers’ techniques and behaviours, and what to do if you’ve been phished
Once a user has been phished, how long does it takes for the phishers to misuse the stolen credentials? To discover the answer to that question and many others, Imperva …
![Blak Hat USA 2017](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103524/gal2-featured-400x200.jpg)
Photo gallery: Black Hat USA 2017, part 2
Black Hat USA 2017 is underway at Las Vegas, and here are a few photos from the Business Hall, the Arsenal, and the Innovation City. Featured companies: NTT Security, …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage