Help Net Security
![binary bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112818/binary-bomb-400x200.jpg)
Thousands of websites exploited for illegal SEO tactics
Imperva researchers discovered a long-running and still active illegal attack that has been exploiting vulnerabilities in thousands of legitimate websites to increase SEO …
![Binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195635/binary-sun-400x200.jpg)
How IT teams are preparing for the rise of intelligent machines
A new survey carried out by analyst firm Freeform Dynamics examines the attitudes and readiness of IT decision makers with regard to intelligent machines and business systems …
![general](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194514/general-400x200.jpg)
Week in review: Mitsubishi Outlander hack, Mozilla funds open source code audits
Here’s an overview of some of last week’s most interesting news and articles: Researchers hack the Mitsubishi Outlander SUV, shut off alarm remotely Mitsubishi …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112017/labyrinth-400x200.jpg)
The future of intrusion detection
It’s always an interesting exercise to extrapolate from current technologies and industry challenges to sketch the future landscape. This especially holds true for cyber …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112010/eye-400x200.jpg)
Hypervisor wiretap feature can leak data from the cloud
Bitdefender has discovered that encrypted communications can be decrypted in real-time using a technique that has virtually zero footprint and is invisible to anyone except …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112020/email-1-400x200.jpg)
Will your cyber insurance pay for email attacks?
If you’re relying on cyber insurance, check if your policies are up-to-date in covering new social engineering email attacks that are leaving firms at risk for taking …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112023/face-400x200.jpg)
Do employers give enough security training?
More than half of UK office workers say their employers have provided no cyber security awareness training, according to ISACA’s 2016 Cyber Security Perceptions study of more …
![CipherCloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112014/ciphercloud-csb-400x200.png)
CipherCloud unveils first GDPR-ready cloud security solution
CipherCloud announced the availability of a cloud security solution designed to help companies comply with the European General Data Protection Requirement (GDPR). Their Cloud …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
Looking for trouble: How predictive analytics is transforming cybersecurity
Leading organizations recognize that stringent cybersecurity processes and strong infrastructure, while essential, are not enough to eliminate today’s disparate and ubiquitous …
![bug](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112038/bug-400x200.jpg)
Bug bounty report card: Industry diversification and growth
With a global rise in cyberattacks and a critical deficit of security talent to combat adversaries, bug bounty programs congruently grew in both volume and scope in the last …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112041/cloud-400x200.jpg)
Perception of cloud security within enterprises is improving
The perception of cloud security within enterprises is improving dramatically year-over year as cloud applications mature, according to Bitglass. One of the most significant …
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195511/fire-match-400x200.jpg)
A third of organizations experienced a data breach in the past 12 months
Despite the increasing number of data breaches and more than 3.9 billion data records worldwide being lost or stolen since 2013, organizations continue to believe perimeter …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage