Help Net Security

Breach activity declines, number of compromised records remains high
After year over year increases in the number of reported data breaches, Risk Based Security has released the results of their Q1 2018 Data Breach QuickView Report, showing the …

First biometric authentication solution for consumer augmented reality headsets
Redrock Biometrics and Epson have partnered to bring PalmID to the MOVERIO Smart Glasses Platform as the first biometric authentication solution for a consumer AR headset. …

Cybercriminals are turning to Telegram due to its security capabilities
Check Point researchers have revealed that cybercriminals are increasingly exploiting the popular messaging app, Telegram, to exchange information, recruit new partners and …

Mobile first: Security concerns and solutions
The majority of people – 83%, in fact – use their mobile devices to go online. 89% of these users connect to the internet via a mobile device every day. However, …

iOS users are 18x more likely to be phished than to download malware
Phishing is the number one mobile threat affecting organizations. The Wandera’s Phishing Report 2018 shows that iOS users are 18x more likely to be phished than to …

Build security into software up front: Believe it or not, it’s cheaper and faster
“You can pay me now, or you can pay me later” was the tagline of a 1981 ad promoting oil filters. Seems simple, but the implied message was much stronger: It wasn’t about …

Risky business: Are mobile employees compromising business info?
Americans logged 457.4 million trips for business in 2016, and there is no sign of business travel slowing down, with global business travel spend expected to rise 5.8 percent …

GDPR Rails: Community GDPR compliance tool
Prey Software announced GDPR Rails, an open source tool set designed to help small to mid-sized businesses comply with the General Data Protection Regulation (GDPR). GDPR …

Are SMBs driving the adoption of security automation by enterprises?
If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized …

May 2018 Patch Tuesday forecast: Where are the flowers?
The wintry weather doesn’t want to give up its hold on us here in the US. The extended cold has kept the spring flowers from blooming, dragging out the winter blues. It …

Which type of biometrics are consumers most comfortable providing?
Consumers feel more comfortable with fingerprint scanning than with other types of biometric technology, including face, eye, voice and other biometric measurements, according …

A smooth transition to the cloud is possible with identity governance
It comes as no surprise that organizations large and small are considering adopting the cloud as part of their overall IT strategy. The variety of impressive benefits that the …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)