Help Net Security
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195355/general_red-400x200.jpg)
Week in review: Hacking industrial robots, criminals exploit SS7 flaws to empty bank accounts
Here’s an overview of some of last week’s most interesting news and articles: Three cybersecurity threat trends that organizations should address today The …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105519/healthcare-400x200.jpg)
Healthcare breaches: Is your data at rest or at risk?
In 2016 healthcare breaches hit an all-time high (328), surpassing the previous record set in 2015 (268), according to Bitglass. Number of breaches Records of approximately …
![defend](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110116/defend-400x200.png)
Three cybersecurity threat trends that organizations should address today
The cybersecurity landscape grows seemingly more complex – and dangerous – by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on …
![Users lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111610/users-lock-400x200.jpg)
Who’s responsible for secure Internet access?
Americans are divided on key issues around Internet access and responsibility for online privacy, according to AnchorFree. Over two thirds of Americans (68%) say Internet …
![World Password Day](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104450/world_password_day-400x200.jpg)
World Password Day: Make the Internet a more secure place
Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Today is World Password Day, and here are some …
![crowd](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104452/crowd-400x200.jpg)
Making security everybody’s business goes beyond strong passwords
One of my colleagues recently shared a story that unfortunately, is not an uncommon happening among line of business application owners. He was monitoring a high value …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104620/email-400x200.jpg)
Majority of workers blindly open email attachments
The vast majority (82 percent) of users open email attachments if they appear to be from a known contact, despite the prevalence of well-known sophisticated social engineering …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104457/gdpr-400x200.jpg)
GDPR requirements: Five high-priority actions
The European General Data Protection Regulation (GDPR) will have a global impact when it goes into effect on May 25, 2018. Gartner predicts that by the end of 2018, more than …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113330/target-400x200.jpg)
Brands increasingly targeted by false websites and phishing
DomainTools released the names of the top U.S.-based retail companies whose brands are frequently abused by criminals creating look-alike domains for phishing. The research …
![City](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104459/city_night-400x200.jpg)
Malware Hunter: Find C&C servers for botnets
Recorded Future and Shodan released Malware Hunter, a specialized crawler for security researchers that explores the Internet to find computers acting as remote access trojan …
![lips](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104756/lips-400x200.jpg)
Battling cyber security’s human condition
There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even …
![Red Hat containers](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104503/redhat_containers-400x200.jpg)
Container Health Index: Red Hat’s standard for trusted containers
Red Hat introduced the Container Health Index, which provides a comprehensive image detail of any enterprise container service. The index grades all of Red Hat’s containerized …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage