Help Net Security
![military](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110755/military-400x200.jpg)
Best practices for using military grade security
Governments and militaries around the world have long recognised that their lines of communications were often their weakest links and required some of the strongest …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Vulnerabilities found in cars connected to smartphones
Many of today’s automobiles leave the factory with secret passengers: prototype software features that are disabled but that can be unlocked by clever drivers. In what …
![law enforcement](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110803/law_enforcement-400x200.jpg)
Law enforcement equipment: Technology plays a complicated role
Law enforcement is challenged by the need for a balance between equipping officers with gear that will protect them while also trying to manage the appearance of acts of …
![L0phtCrack](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110759/lophtcrack-400x200.png)
L0phtCrack 7 audits passwords up to 500 times faster
L0pht Holdings released a completely revamped L0phtCrack 7, which includes a new cracking engine which takes optimal advantage of multi-core CPUs and multi-core GPUs. A 4-core …
![web](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110813/web-400x200.jpg)
Ubiquity and danger: The web scraping economy
Web scraping is a technique of extracting information from web sites, and often includes transforming unstructured web site data into a database for analysis or repurposing …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Risk and the Pareto Principle: Applying the 80/20 rule to your risk management strategy
Enterprises these days are putting more resources into monitoring and managing business risk. And with good reason – in light of a growing number of vulnerabilities and …
![cloud hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110822/cloud-hand-400x200.jpg)
55% of apps are already in the cloud, security a priority
Executives are increasingly adopting a digital business model, with the cloud as the key enabler. However, security concerns and tepid execution complicate the ability of the …
![analytics IT assets](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09113947/analytics-400x200.jpg)
Feds are using big data analytics for cybersecurity, but is it effective?
81 percent of Feds say their agency is using big data analytics for cybersecurity in some capacity – 53 percent are using it as a part of their overall cybersecurity strategy …
![locks](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111109/locks-400x200.jpg)
DNSSEC: Don’t throw the baby out with the bath water
A recent report raiseed concerns about the abuse of DNSSEC to conduct DDoS attacks. The article reported that DNSSEC-signed domains can be used to conduct reflected DDoS …
![CSA book](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110837/csa-book-400x200.jpg)
100 best practices in Big Data security
The Cloud Security Alliance (CSA) released the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in Big Data security. The Big Data Security …
![BYOD](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110841/byod-400x200.jpg)
How much of a risk is BYOD to network security?
We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system …
![arrow](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112324/arrow2-400x200.jpg)
Week in review: iOS zero-days exploited, hacking cellphone towers and brain implants
Here’s an overview of some of last week’s most interesting news, reviews and articles: Backdoor uses TeamViewer to spy on victims A backdoor Trojan with spying …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage