Help Net Security
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113635/criminal-400x200.png)
Global profiles of the typical fraudster
Technology is an important tool to help companies fight fraud, but many are not succeeding in using data analytics as a primary tool for fraud detection. Meanwhile, fraudsters …
![LG G3](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194754/lg-g3-400x200.jpg)
Check Point finds dangerous vulnerabilities in LG mobile devices
Check Point found two vulnerabilities which can be used to elevate privileges on LG mobile devices to attack them remotely. These vulnerabilities are unique to LG devices, …
![crime scene](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113225/crime_scene-400x200.png)
Hacker imprisoned for stealing Bitcoin, selling botnet on Darkode
A Louisiana man was sentenced to 12 months and one day in prison for using a computer to steal money, hacking computers to obtain passwords, and attempting to sell information …
![credit cards secure](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113343/credit_cards_secure-400x200.jpg)
Payment Application Data Security Standard 3.2 released
The PCI Security Standards Council (PCI SSC) published a new version of its data security standard for payment software, the Payment Application Data Security Standard …
![success](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113141/success-400x200.jpg)
Five tips to avoid getting hit by ransomware
Ransomware has emerged as the predominant online security threat to home users and small businesses. Delivered through spam or phishing emails that trick users into clicking …
![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112231/sap2-400x200.jpg)
SANS maps SAP cybersecurity to the CIS Critical Security Controls list
The CIS Critical Security Controls are a set of internationally recognized standards outlining the most important cyber hygiene actions that every organization should …
![market](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195228/market-400x200.jpg)
Growing advanced threats will augment the IT security market through 2020
Research analysts are forecasting positive growth for many segments of the global IT security market over the next four years as several markets including BYOD security, …
![general virtual digital](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113219/general-virtual-400x200.jpg)
Week in review: API security, keyloggers disguised as USB device chargers, online tracking
Here’s an overview of some of last week’s most interesting news and articles: Faulty TLS implementation opens VISA sites, users to attack A group of researchers …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112237/money-dollar-400x200.jpg)
IT security skills remain in high demand
IT security tops the list of the skills that IT decision-makers say they want their team members to have, according to a new report by Global Knowledge, based on input from …
![CEO](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112240/ceo-400x200.jpg)
1 in 10 banking CEOs don’t know if they’ve been hacked
Twelve percent of banking CEOs say they do not have insight into whether their institution’s security has been compromised by a cyber attack in the past two years, …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112242/abstract-400x200.jpg)
Making security a high priority may not lead to improved measures
Technology professionals see many steps that could be taken to improve their company’s security. Just over half of the 500 security professionals surveyed by CompTIA say …
![Big Data](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195336/bigdata-400x200.jpg)
Big Data and business analytics revenues to reach $187 billion in 2019
Worldwide revenues for Big Data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase of more than 50% over the …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage