Help Net Security
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Week in review: Pokémon GO, flawed code hooking engines, Ubuntu Forums hacked again
Here’s an overview of some of last week’s most interesting news and articles: Preparing for new EU cybersecurity rules and regulations The Network and Information …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111417/wifi-400x200.jpg)
Wi-Fi hack experiment conducted at Republican National Convention site
Avast security researchers conducted a Wi-Fi hack experiment at various locations around the Republican National Convention site in Cleveland to demonstrate how risky it can …
![energy](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100508/energy-400x200.jpeg)
How to secure critical utilities
Over the past few years the issue of cybersecurity and the threat of hackers stealing data has increased tenfold. Not a day goes by without a breach being reported of a …
![Cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195223/cloud_sky-400x200.jpg)
Cloud shift will affect $1 trillion in IT spending
More than $1 trillion in IT spending will be directly or indirectly affected by the shift to cloud during the next five years, said Gartner, Inc. This will make cloud …
![secure](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111740/secure-400x200.jpg)
Companies are unprepared to protect key assets
Knowledge assets are confidential information critical to a company’s core business – other than personal information that would trigger notice requirements under …
![Borderless Cyber Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112202/borderless_cyber_europe-400x200.jpg)
Andrus Ansip to keynote Borderless Cyber Europe
Today’s digital threats are more numerous and sophisticated than ever. As a result, many in the security industry feel organizations can no longer adequately defend …
![Kickass Torrents](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111415/kickass-400x200.jpg)
Alleged Kickass Torrents owner arrested, site taken down
Artem Vaulin, a 30-year-old Ukrainian that is believed to be the creator and owner of Kickass Torrents, currently the most popular and most visited illegal file-sharing …
![sap](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113936/sap-400x200.jpg)
Vulnerabilities affecting SAP HANA and SAP Trex put 10,000 customers at risk
Onapsis released new security advisories detailing vulnerabilities in SAP HANA and SAP Trex. Included in the advisories is a critical risk vulnerability that could be used to …
![EU](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111424/eu-400x200.jpg)
Preparing for new EU cybersecurity rules and regulations
Recently, the European Parliament signed off on its first ever set of cybersecurity rules. The Network and Information Security (NIS) Directive spells the end of more than …
![lighter](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113536/lighter-400x200.jpg)
1 in 3 content theft websites expose visitors to malware
A Digital Citizens investigation has found that malware operators and content theft website owners are teaming up to target consumers – with an unexpected assist from …
![entrepreneur](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113159/entrepreneur-400x200.jpg)
Challenges of cybersecurity due diligence in the acquisition process
Acquirers are increasingly aware of the need for vigorous cybersecurity due diligence in M&A, yet often lack the proper personnel to conduct thorough analyses, according …
![wire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194903/wire-400x200.jpg)
Overreliance on perimeter-based defense creates opportunities for attackers
RSA has announced the results of research that demonstrates organizations in Asia Pacific & Japan (APJ) investing in detection and response technologies are better poised …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage