Help Net Security

Tesco Bank hack shows that attackers continue to follow easy money
What happens when nearly 9,000 accounts at a financial institution experience fraudulent activity and clients have nearly £2.5 million stolen? People notice. The bank notices …

Number of vulnerable enterprises at five year record high
Enterprises across the globe are refreshing their network equipment earlier in its lifecycle in a move to embrace workplace mobility, Internet of Things, and software-defined …

Navigating a way through the cloud
Private cloud is a compelling proposition for many businesses. With the help of server virtualisation, you can take your own infrastructure; make it ‘cloud-like’ and because …

Increasing number of financial institutions falling prey to cyber attacks
66.2 percent of financial organizations faced at least one cybersecurity attack in the last year, according to MetricStream Research. The report, based on a survey conducted …

Half of EMEA CIOs participating in a digital ecosystem
CIOs in Europe, the Middle East and Africa (EMEA) are clearly engaging with the era of digital business, with 50 percent participating in a digital ecosystem and 65 percent …

Apocalypse now: The IoT DDoS threat
One of the things you learn about humanity, if you’re paying attention, is that “gold rushes” bring out the worse in us. When there are no constraints and there is a greed …

Securing Black Friday sales: Is your business ready?
Black Friday is the day following Thanksgiving Day in the US, well-known for a variety of promotional sales. These are dependent on Internet connections working, servers …

IT spending in EMEA will grow in 2017
Gartner forecasts that IT spending in Europe, the Middle East and Africa (EMEA) will total $1.25 trillion in 2017, a 1.9 percent increase from 2016. IT spending across all the …

Dr. Neil deGrasse Tyson to keynote RSA Conference 2017
Dr. Neil deGrasse Tyson will be part of the keynote lineup of speakers for RSA Conference 2017 in San Francisco, CA. Dr. Tyson’s professional research interests are broad, but …

Exposing voting machine vulnerabilities
Cylance announced the successful exploitation of critical vulnerabilities in a common model of voting machine. The exploitation of these vulnerabilities was previously thought …

Retailers overconfident in endpoint security
A new study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to …

10 predictions on IT changes over the next 36 months
Today’s IT organizations are divided into two camps: those that thrive by effectively leveraging digital technologies, new business models, and entrepreneurial cultures; …