Help Net Security
Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!
A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University …
Growing risk associated with mobile and IoT application security
Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …
Retailers largely lack on-site security and IT expertise
A new Cybera survey of more than 50 retail professionals found that many retailers lack the necessary IT staff at the store level to ensure proper solution implementation and …
Open source cybersecurity framework for the automotive industry
A consortium of researchers announced the development of a universal, free, and open source framework to protect wireless software updates in vehicles. The team issued a …
Majority of SOCs are below optimal maturity levels
With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …
82% of executives experienced a fraud incident in the past year
Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The …
What resellers think about threats to customers
A new survey, designed to capture the reseller’s perspective on customer cyber threat concerns and their overall understanding of the firewall market, examined the views …
Organizations to gradually replace physical access cards with smartphones
In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner said that 20 percent of organizations will use …
RSA Conference Innovation Sandbox Contest 2017 finalists announced
RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …
In 2017, the digital will get physical when machines start to lie
In a memorable scene from a 2014 episode of the series Homeland, the Vice President is murdered by hackers who tamper with his pacemaker. Despite this plot idea reportedly …
Patch and security management take 8 hours per month for most companies
Shavlik and AppSense used VMworld Europe 2016 to collect data from frontline experts, and to highlight patch management and security concerns in corporations. A total of 178 …
Significant decrease in Locky ransomware attacks
Locky ransomware attacks have dramatically decreased during December 2016, according to Check Point. Locky, which uses massive spam campaigns as a major distribution vector, …
Featured news
Resources
Don't miss
- How AI is reshaping attack path analysis
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform