Help Net Security
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105121/phishing-400x200.jpg)
Phishing trends: Who is targeted and why
The business model of phishing has evolved. The bad guys have found ways to multiply their profits at the expense of organizations they aren’t even attacking directly, …
![Search](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112405/search-threat-400x200.jpg)
Monitoring scanning activities that could lead to IoT compromises
IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …
![phone call](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111512/phone_call-400x200.jpg)
Can smartphone thieves be identified in seconds?
Ben-Gurion University of the Negev (BGU) researchers have developed a technique that identifies a smartphone thief or intruder in under 14 seconds. “While most people …
![AlienVault USM Anywhere](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105131/alienvault-usm_anywhere-400x200.jpg)
USM Anywhere simplifies security for organizations of all sizes
AlienVault announced the availability of USM Anywhere, an all-in-one Software-as-a-Service (SaaS) security monitoring platform designed to centralize threat detection, …
![Absolute](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105133/absolute-self_healing-400x200.jpg)
Self-healing endpoint security as a foundation for visibility
When it comes to persistent cyber threats, a majority of companies have resigned themselves to the fact they will be or are already infiltrated by an unknown adversary. It is …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
8.4 billion connected things will be in use worldwide in 2017
Gartner forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. Total spending on endpoints …
![cables](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112246/cables-400x200.jpg)
It’s time to rethink using remote access VPNs for third-party access
No longer safely operating behind the traditional corporate perimeter, business productivity today depends on integrating external members of the extended enterprise into the …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105933/eye-400x200.jpg)
Global biometrics market revenue to reach $15.1 billion by 2025
The biometrics market has reached a tipping point. Driven largely by the confluence of organizations’ desires to better authenticate or identify users and users’ distaste for …
![firefighters](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111014/firefighters-400x200.jpg)
Number of disclosed vulnerabilities reaches all time high in 2016
A new report shows 2016 broke the previous all-time record for the highest number of reported vulnerabilities. The 15,000 vulnerabilities cataloged during 2016 by Risk Based …
![car swerving hacking](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113500/road-sign-663362_1920-400x200.jpg)
Don’t take your hands off the wheel
Let me tell you a story. It’s a story about my brother-in-law, whom, for the sake of decency, we’ll call Steve. Steve has a new car. He loves that new car. It’s great. Does …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105147/certificate-400x200.jpg)
Scale, frequency and causes of certificate-related outages
Certificate-related outages negatively impact the reliability and availability of vital systems and services, according to Venafi. “Certificates and keys are identity and …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105427/abstract-400x200.jpg)
Week in review: Windows DoS zero-day, uncloaking Tor Browser users
Here’s an overview of some of last week’s most interesting news and articles: Half of IT pros don’t know how to improve their security posture Mid-market …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage