Help Net Security
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
Proliferation of vulnerable open source components creates growing risk
The continued and persistent use of components in software development is creating systemic risk in our digital infrastructure. A new Veracode report also found that companies …
![Wireless](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195303/wireless-green-400x200.png)
Public Wi-Fi: Users’ habits and perceptions of risk
A new Xirrus survey highlights users’ habits and perceptions of risk when connecting to public Wi-Fi. The survey polled more than 2,000 business users, including executives …
![medical money](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110158/medical-money-400x200.jpg)
Securing medical devices: Cybersecurity spending to triple by 2021
The medical IoT is set to transform healthcare through smart medical devices. However, their success is in jeopardy if cybersecurity concerns are not addressed immediately.
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Civilization infrastructure: Connected sensors and digital intelligence
A new type of infrastructure needs to be built that is not just going to reshape business, but also the way people live, according to Gartner. CIOs are the builders of this …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113326/vault-400x200.jpg)
Four ways to keep data safe during election season
There is no shortage of passionate feelings among voters when it comes to this November’s presidential election. Those feelings extend tenfold to each candidate’s campaigns. …
![skull binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113205/skull-api-400x200.jpg)
Fight fraud: Scams, identity theft, ransomware attacks
In an increasingly technology-oriented world, cybercrime has become all too common for both consumers and businesses. Internet crime takes many forms and includes everything …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
Critical cybersecurity priorities for the next US president
While the US presidential campaign has occasionally focused on cyber security, the topic demands more urgent attention from the individual elected as the 45th President of the …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110202/money-400x200.jpg)
How much law firms dedicate to data privacy and security
Vulnerabilities in law firms’ data security present an unprecedented existential threat, while increasing corporate demand for legal expertise in information security, …
![Europol](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110453/europol-400x200.jpg)
13 countries join global ransomware fight
Just three months after the successful launch of the No More Ransom project, law enforcement agencies from a further 13 countries have signed up to fight ransomware together …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110221/iot-1-400x200.jpg)
Democracy for the Internet of Things
In the past I’ve written a number of times on the way that the IoT potentially changes the relationship between governments and their constituents – and a profound change that …
![ENISA Cyber Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110218/enisa-cyber_europe-400x200.jpg)
Cyber Europe 2016: Analyzing realistic cybersecurity incidents
The European ICT Industry is one of the most advanced in the world. Making the EU’s single market fit for the digital age could contribute €415 billion per year to the …
![hourglass](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111605/hourglass-400x200.jpg)
Week in review: Social media surveillance, ransomware recovery, US accuses Russia of hacking
Here’s an overview of some of last week’s most interesting news, reviews and articles: Twitter, Facebook revoke access to social media surveillance software used …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage