Help Net Security

Stealing Windows credentials using Google Chrome
Attacks that leak authentication credentials using the SMB file sharing protocol on Windows OS are an ever-present issue, exploited in various ways but usually limited to …

Major international crackdown on tech support scams
The FTC, along with federal, state and international law enforcement partners, announced Operation Tech Trap, a nationwide and international crackdown on tech support scams …

A guide on how to prevent ransomware
Ransomware is fast becoming a major threat to computer systems in many organisations. It is an aggressive form of attack which criminals use to infect computers and block the …

Key to smart cybersecurity spending: Remove redundancies and strive for unification
Over the past two decades, the cybersecurity industry has been completely transformed. For organizations, cybersecurity’s evolution from a cottage industry to an economic …

Privacy awareness checklist for GDPR readiness
A little more than a year out from its effective date of May 25, 2018, the General Data Protection Regulation (GDPR) is undoubtedly on the minds of many of privacy …

Week in review: WannaCry disaster, SharePoint security, the importance of security culture
Here’s an overview of some of last week’s most interesting news and articles: Massive ransomware campaign spreading around the world like wildfire Organizations …

Industry reactions to Trump’s executive order on cybersecurity
On Thursday, President Donald Trump signed a long-awaited executive order on cybersecurity. Mainly, the order requires a number of cybersecurity reviews across the various …

Advantages of quantum processing shown in head-to-head race
A prototype quantum processor repeatedly beat a traditional, classical processor in a race to solve a puzzle, figuring out a secret combination up to 100 times faster by using …

Digital transformation initiatives: What are you doing to get ahead?
Digital transformation initiatives are more successful when they have buy-in from across the business, according to Splunk. Progress with digital business transformation …

Keys to attracting and retaining cybersecurity talent
Federal agencies need to invest strategically and heavily in their benefits strategy if they’re going to successfully compete for cybersecurity talent, according to the …

Data security disruptions can have cascading negative impacts
Nine in 10 global cybersecurity and risk experts believe that cyber risk is systemic and that simultaneous attacks on multiple companies are likely in 2017, according to AIG. …

Most companies falsely believe their Active Directory is secure
A majority of companies falsely believe their Active Directory (AD) is secure, according to a new survey conducted jointly by Skyport Systems and Redmond Magazine. The …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)