Help Net Security
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113635/criminal-400x200.png)
Interpol arrests Nigerian scam mastermind who stole $60 million
The head of an international criminal network behind thousands of online frauds has been arrested in a joint operation by INTERPOL and the Nigerian Economic and Financial …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
The growing threat of ransomware: Lucrative, low-risk and easy to use
Recent headlines are testament to the growing popularity of ransomware attacks on businesses and consumers alike. In January, for example, Lincolnshire County Council saw its …
![Needle](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111257/needle-ios-400x200.jpg)
Needle iOS security testing tool to be unveiled at Black Hat Arsenal
In a session at Black Hat USA 2016 on Wednesday, Marco Lancini, Security Consultant at MWR InfoSecurity, will demonstrate publicly for the first time a new iOS security …
![ThreatPath](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111254/threatpath-400x200.jpg)
Visibility and assessment of vulnerable attack paths
Attivo Networks announced that its ThreatMatrix Deception and Response Platform has been enhanced to provide an organization’s visibility and assessment of vulnerable attack …
![success](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113141/success-400x200.jpg)
Week in review: Snooping Tor nodes, Wi-Fi keyboards open to keystroke sniffing
Here’s an overview of some of last week’s most interesting news, reviews and articles: Industry collaborates on automotive cybersecurity best practices More than …
![Privacy Shield](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114002/privacy-shield-item-400x200.jpg)
European privacy advisor wants encryption without backdoors
“The confidentiality of online communications by individuals and businesses is essential for the functioning of modern societies and economies. The EU rules designed to …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113423/world-400x200.jpg)
Business and IT decision makers are aligned on key IT trends
Business decision makers’ (BDMs) and IT decision makers’ (ITDMs) understanding of current IT trends are much closer than they are generally perceived to be, according to a new …
![Abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194417/abstract-dark-400x200.png)
IoT: A hacker’s dream come true?
There’s a lot more to the web than the cat-video-laden sites we normally see. In fact, according to most sources, the web that we can typically get to via our browser of …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112041/cloud-400x200.jpg)
Virtually all business cloud apps lack enterprise grade security
Blue Coat Systems analyzed apps for their ability to provide compliance, data protection, security controls and more. Of the 15,000 apps analyzed, it was revealed that 99 …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112900/key-400x200.jpg)
Businesses need to protect data, not just devices
As organizations embrace the digital transformation of their business, they are increasingly facing new security concerns. More companies are moving away from device-centric, …
![Pwnie Express](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111336/pwnie_express-400x200.jpg)
Pwnie Express open sources IoT and Bluetooth security tools
Pwnie Express announced the availability of open sourced versions of its Blue Hydra and Android build system software. The release of these tools enable comprehensive …
![IOActive](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111259/ioactive-400x200.jpg)
IOActive offers offensive security approach to risk assessment
IOActive launched its Advisory Services practice, offering strategic security consulting that leverages IOActive’s testing and research expertise to help customers …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage