Help Net Security
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105149/idea-400x200.jpg)
How to minimize the risk and impact of identity fraud
The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. They …
![Industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112121/cooling-tower-1368823_1920-400x200.jpg)
Recommendations to help the security of ICS-SCADA systems
The use of long-range communication networks, and specially the Internet, has revolutionised ICS-SCADA systems and architectures. The use of network communication in these …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110235/building-400x200.jpg)
Identity fraud hits record high
The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
AppSec teams facing resourcing issues that are making them vulnerable
A new Bugcrowd study of one hundred CISOs revealed that 94 percent are concerned about breaches in their publicly facing assets in the next 12 months, particularly within …
![credit cards secure](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113343/credit_cards_secure-400x200.jpg)
PCI SSC publishes best practices for securing e-commerce
Exponential online sales growth paired with the EMV chip migration in the US makes e-commerce payment security for merchants more important than ever before. As EMV chip …
![binary bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112818/binary-bomb-400x200.jpg)
91% of phishing attacks are display name spoofs
GreatHorn analyzed more than 56 million emails from 91,500 corporate mailboxes from March to November 2016. The data found that display name spoofs are the clear phishing …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194554/money-400x200.jpg)
CSOs reveal true cost of breaches
Over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, according to the Cisco …
![SSD](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105206/ssd-400x200.jpg)
SSD security challenges: Which data sanitization methods are effective?
In recent years, a growing number of data breaches have resulted from the improper data removal and insecure storage of drives. Organizations face a myriad of internal and …
![world biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112821/world-biohazard-400x200.jpg)
The emergence of new global cybercriminal attack patterns
The findings of a new Malwarebytes report illustrate a significant shift in cybercriminal attack and malware methodology from previous years. Ransomware, ad fraud and botnets, …
![ThreatQuotient](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105203/threat-intelligence-equal-bknd-400x200.jpg)
ThreatQ 3.0: A threat intelligence platform with fine-tuned controls
ThreatQuotient announced new ThreatQ platform advancements, a robust Partner Integration Program and Professional Services offerings to answer industry demand to make threat …
![Europol](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105538/europol-400x200.jpg)
Europol and GCA will fight cybercrime through the exchange of information
Europol and the Global Cyber Alliance (GCA) signed a Memorandum of Understanding (MoU) to cooperate on decreasing systemic cyber risk and improving internet security …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112155/skull-400x200.jpg)
Why companies shouldn’t feel helpless in the fight against ransomware
According to recent reports, ransomware is now a billion dollar business for cybercriminals. Attackers are honing in on the weak spots of organisations; human behaviour …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage