Help Net Security
![calculator](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104745/calculator-400x200.jpg)
Cyber insurance: What and why?
High-profile cyber-attacks are fast becoming the norm in modern society, with 2016 being arguably the worst year for major security breaches. National Crime Agency statistics …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104739/world02-400x200.jpg)
Week in review: WhatsApp flaw, lip motion passwords, reinventing software patching
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Vulnerability in WhatsApp and Telegram allowed complete account takeover …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104753/iot-1-400x200.jpg)
IoT and the resurgence of PKIs
With the digital revolution in full swing, security methods and models need to be re-evaluated to better address both the changing nature of enterprise architectures and …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110041/bot-400x200.jpg)
Bad bots attack 96% of websites with login pages
Almost every website with a login page is under attack from bad bots, the automated programs used to carry out a variety of nefarious activities, according to Distil Networks. …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110851/brain-400x200.jpg)
What impact will artificial intelligence have on business?
Tata Consultancy Services polled 835 executives across 13 global industry sectors in four regions of the world, finding that 84% of companies see the use of AI as …
![tech](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112234/tech-400x200.jpg)
Adoption of advanced technology continues quickly despite security gaps
93% will use sensitive data in an advanced technology (defined as cloud, SaaS, big data, IoT and container) environments this year. 63% of those also believe their …
![woman](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105018/woman-400x200.jpg)
There’s a chronic shortage of women in information security
A survey of over 19,000 cybersecurity professionals has revealed a chronic shortage of women working in the cybersecurity amid a widening skills gap, with women forming just …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104803/chess-400x200.jpg)
Data breaches: Playing by a new set of rules?
Tell me, what’s your response when you hear that a company that was breached are now losing customers? I suppose it’s at this point the word reasonable makes an appearance. …
![documents](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111709/documents-400x200.jpg)
Securing document flow: Exploring exposure and risk
There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the BPI …
![HITB Amsterdam](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104806/hitb_ams-400x200.jpg)
Hack In The Box announces keynotes for 2017 Amsterdam event
Hack In The Box announced an exciting line-up for its annual security conference taking place in Amsterdam on April 13th and 14th. Groundbreaking security research covering …
![laptop crime](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105508/laptop-crime-400x200.jpg)
U.S. charges Russian FSB officers for hacking Yahoo, millions email accounts
A grand jury in the Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, …
![WhatsApp Telegram](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104759/whatsapp-telegram2-400x200.jpg)
Vulnerability in WhatsApp and Telegram allowed complete account takeover
Check Point researchers today revealed a new vulnerability on WhatsApp and Telegram’s online platforms – WhatsApp Web & Telegram Web. By exploiting this vulnerability, …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage