Help Net Security
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112909/user-400x200.jpg)
Behavior is the new authentication: A look into the future
In the next few years organizations will face extreme IT security challenges. Hackers are targeting humans instead of machines. All the most costly cyber attacks (APTs, …
![contactless payment](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112344/contactless_payment-400x200.jpg)
Contactless payment market to reach $17.56 billion by 2021
The contactless payment market is expected to grow from USD 6.70 Billion in 2016 to USD 17.56 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 21.2%, according to …
![general](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194514/general-400x200.jpg)
Week in review: The life of a social engineer, and the end of TeslaCrypt
Here’s an overview of some of last week’s most interesting news and articles: The life of a social engineer: Hacking the human A clean-cut guy with rimmed glasses …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112354/chain-400x200.jpg)
Blockchain technologies: A key tool for data management?
Blockchain technologies (the technical foundation for Bitcoin) hold great potential to solve government’s long-term challenge of establishing clear rules about who has …
![cyber resilience](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112351/cyber_resilience-400x200.jpg)
Making the financial sector more resilient to cyber attack
Firms across the financial and related professional services industry need to take urgent action on cyber risk, according to a new report from TheCityUK and Marsh. There were …
![World](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112411/world-binary-400x200.jpg)
The changing economics of the digital ecosystem
The GSMA published a new report examining the structure, economic drivers and financial performance of the global Internet economy and its respective segments. The research …
![Search](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112405/search-threat-400x200.jpg)
You are what you click: Online search security risks
When it comes to the desire for the ideal body, people may be willing to sacrifice their online security if it takes them a step closer to achieving desired results, according …
![Laptop](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113726/hands-coffee-cup-apple-400x200.jpg)
How developers fight the rise in web application attacks
Recent reports highlight the challenge faced by developers in securing code as attacks against web applications increase, while security budgets for developers remain low, …
![bitly](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112420/bitly-400x200.jpg)
Bitly partners with Let’s Encrypt for HTTPS links
Bitly processes data associated with more than 12 billion clicks per month, leading to massive troves of intelligence. Now, they’re partnering with Let’s Encrypt …
![ATM](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112424/atm-400x200.jpg)
Criminals turn entire ATMs into skimmers
As if withdrawing money from an ATM wasn’t dangerous enough, researchers discovered that Russian-speaking Skimer group forces ATMs to assist them in stealing users’ …
![dollar](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112427/dollar-400x200.jpg)
Cybercrime economy: The business of hacking
The profile of typical cyber attackers – and the interconnected nature of their underground economy – have evolved in the last several years. Adversaries are …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
Only two percent of IT experts consider third-party secure access a top priority
Soha Systems released a report based on a survey conducted by the newly formed Soha Third-Party Advisory Group, which consists of security and IT experts from Aberdeen Group, …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage