Help Net Security

Family dynamics in a connected world
A new global study by Intel Security aims to better comprehend how families’ attitudes and habits are evolving as their homes and lifestyles become increasingly connected. …

Real-time network health management: Closing the gap between known and unknown threats
2016 was yet another record year for cyber security threats. As of July 2016, there were 522 reported breaches, exposing more than 13 million records, according to the …

Effective ICS cyber defense methods
Cyber defense risks are on the top of concern for every manager operating manufacturing and critical infrastructure. The solutions for protecting the Confidentiality, …

54% of Americans say existing cyber security laws aren’t getting the job done
As President Trump and the new Congress stake out a 2017 agenda, Americans want to see a pressing need to modernize laws dealing with the digital economy and stepped up …

Security management outlook: Five trends to watch
Cybersecurity can’t sit still. As we look ahead to what this year has in store for the security management landscape, organizations globally should be paying attention to five …

Global data privacy laws: The #1 cross-border e-discovery challenge
In the year since the EU’s rejection of Safe Harbor, there has been a spike in legal concern over cross-border data transfers, according to a survey by BDO Consulting. Sixty …

Week in review: Kali Linux certification, cross-browser fingerprinting, most common passwords of 2016
Here’s an overview of some of last week’s most interesting news and articles: Fruitfly: Unusual Mac backdoor used for tightly targeted attacks? The malware – …

Western Union admits it facilitated scammers, forfeits $586 million
Western Union has agreed to forfeit $586 million and enter into agreements with the Federal Trade Commission, the Justice Department, and several U.S. Attorneys’ Offices. …

Data breaches hit all-time record high, increase 40% in 2016
The number of U.S. data breaches tracked in 2016 hit an all-time record high of 1,093, according to a new report by the Identity Theft Resource Center (ITRC) and CyberScout. …

Advancing a standard format for vendors to disclose cybersecurity vulnerabilities
Technology providers and their customers are joining forces to advance a standard format for vendors to disclose cybersecurity vulnerabilities. The work of the new OASIS …

Most employees use unsanctioned group chat tools
Employees are sharing sensitive company information using group chat tools that are not officially sanctioned for use, according to SpiderOak. The survey consisted of 600 …

Apple’s malware problem is accelerating
For a long time, one of the most common reasons for buying an Apple computer over a Windows-based one was that the former was less susceptible to viruses and other malware. …