Help Net Security

There’s a chronic shortage of women in information security
A survey of over 19,000 cybersecurity professionals has revealed a chronic shortage of women working in the cybersecurity amid a widening skills gap, with women forming just …

Data breaches: Playing by a new set of rules?
Tell me, what’s your response when you hear that a company that was breached are now losing customers? I suppose it’s at this point the word reasonable makes an appearance. …

Securing document flow: Exploring exposure and risk
There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the BPI …

Hack In The Box announces keynotes for 2017 Amsterdam event
Hack In The Box announced an exciting line-up for its annual security conference taking place in Amsterdam on April 13th and 14th. Groundbreaking security research covering …

U.S. charges Russian FSB officers for hacking Yahoo, millions email accounts
A grand jury in the Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, …

Vulnerability in WhatsApp and Telegram allowed complete account takeover
Check Point researchers today revealed a new vulnerability on WhatsApp and Telegram’s online platforms – WhatsApp Web & Telegram Web. By exploiting this vulnerability, …

Cyber espionage topping the list of largest security concerns
20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat …

Mobile workers continually expose organizations to security risks
29 percent of organisations have already experienced either a data loss or breach as a direct result of mobile working, according to research conducted by Vanson Bourne. As …

Worldwide infosec spending to reach $90 billion in 2017
Enterprises are transforming their security spending strategy in 2017, moving away from prevention-only approaches to focus more on detection and response, according to …

Several high risk 0-day vulnerabilities affecting SAP HANA found
Onapsis discovered several high risk vulnerabilities affecting SAP HANA platforms. If exploited, these vulnerabilities would allow an attacker, whether inside or outside the …

Will the IoT force truck stops?
“Not with a bang, but with a whimper,” that was how T.S. Eliot described how the world would end, in his 1925 poem “The Hollow Men.” Things don’t always end in …

Top five most wanted malware families worldwide
The Hancitor downloader has surged into the top five most wanted malware families worldwide for the first time, according to Check Point. The downloader, that installs …