Help Net Security

Gooligan Android malware used to breach a million Google accounts
Check Point security researchers have revealed a new variant of Android malware, breaching the security of more than one million Google accounts. The new malware campaign, …

Tips for businesses to avoid being the next big headline
Data integrity breaches are set to send shockwaves throughout the world in 2017, with at least one almighty breach disclosure of this type expected next year, according to …

SMEs more prone, but still quite oblivious, to cyberattacks
Despite governments, organizations and brands intensifying their cybersecurity awareness campaigns in recent years, as well as several recent high-profile attacks and security …

158% increase in Android platform vulnerabilities
A new Quick Heal report reveals an increase in vulnerabilities on the Android platform, as well as a 33 percent rise in mobile ransomware. Researchers also found a slight …

Employees rely largely on personally owned mobile devices in the workplace
Mobile device adoption in the workplace is not yet mature, found a recent survey from Gartner. Although 80 percent of workers surveyed received one or more corporate-issued …

McAfee Labs predicts 14 security developments for 2017
Intel Security released its McAfee Labs 2017 Threats Predictions Report, which identifies 14 threat trends to watch in 2017. “To change the rules of the game between attackers …

What will the data breach landscape look like in 2017?
While many companies have data breach preparedness on their radar, it takes constant vigilance to stay ahead of emerging threats and increasingly sophisticated cybercriminals, …

Five step approach to address data breaches, increase online trust
The Internet Society has released the findings from its 2016 Global Internet Report in which 59 percent of users admit they would likely not do business with a company which …

SMBs will spend $564 billion on IT hardware, software, and services
IDC forecasts SMBs will spend $564 billion on IT hardware, software, and services, including business services, in 2016. This amount is expected to increase at a compound …

Network security: A team sport for SMBs
The increased volume and frequency of cyberattacks has made information security an everyday issue of great importance, regardless of your geographical location, industry, …

Tips to shop safely on Cyber Monday
As consumers gear up for Cyber Monday, the largest online shopping day of the year, cybercriminals are also preparing to take advantage of deal-seekers. IBM X-Force …

Week in review: Locky spreading via Facebook, principles for efficient cyber investigations
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Cobalt hackers executed massive, synchronized ATM heists across Europe, …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated