Help Net Security
Sensitive data stolen in Gyft data breach
Gyft, a digital gift card platform that enables you to buy, send, and manage gift cards from hundreds of retailers, is notifying users who may have been affected by a security …
Week in review: EU-US Privacy Shield, using AI to build an army of virtual analysts
Here’s an overview of some of last week’s most interesting news and articles: Fake Amazon survey-for-money offer leads to account compromise “As a valued …
Cloud Security Alliance hackathon offers $10,000 prize
The Cloud Security Alliance (CSA) will hold its fourth hackathon at the RSA Conference 2016 in San Francisco, to continue to test the CSA Software Defined Perimeter (SDP) …
Modern IRM: Securing the future of work
No matter what business you’re in, the one thing you produce more than anything else is text. Every day, you and your colleagues are creating, discussing, and documenting …
EU-US Privacy Shield: New framework for transatlantic data flows
The European Commission and the United States have agreed on a new framework for transatlantic data flows: the EU-US Privacy Shield. The College of Commissioners approved the …
Severe and unpatched eBay vulnerability allows attackers to distribute malware
Check Point researchers have discovered a severe vulnerability in eBay’s online sales platform, which allows criminals to distribute malware and run phishing campaigns. …
Security and privacy issues plague wearable fitness tracking devices
A new report is describing major security and privacy issues in several leading wearable fitness tracking devices and accompanying mobile applications. The research examined …
Your board and cyber risk: Reimagining security protocols from the top down
As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the …
Exposing the economics behind cyber attacks
A new survey by the Ponemon Institute provides insight into topics like the average earnings of a cyberattacker, the amount of time attacks typically take, and how to prevent …
Reactions to the HSBC DDoS attack
Last week HSBC’s online banking website was taken down by a DDoS attack, leaving thousands of customers unable to access its services. Here are some of the comments Help Net …
Android users on high alert as malware, phishing and scams are projected to rise
Android phones are popular and growing more so every day. According to research firm IDC, there were close to 350 million active smartphones worldwide in the second quarter of …
Tails 2.0 fixes many security issues
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity. Tails 2.0 is …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage