Help Net Security

Mobile ransomware increases 200 percent
There’s been a startling 200 percent increase in mobile ransomware detection in Q2, according to Quick Heal. This amounts to nearly 50 percent of the ransomware detected …

What is access governance? A brief deep dive
Access governance is the evolution, the next great step if you will, in the identity and access management world. Access governance is a more robust, holistic approach to …

Programmer arrested for hacking Linux Kernel Organization
A South Florida-based computer programmer made an appearance in the Southern District of Florida yesterday after being arrested Sunday on charges of hacking into computers …

Hacker Guccifer sentenced to 52 months in prison
Romanian hacker Guccifer, i.e Marcel Lehel Lazar, who unlawfully accessed the private online accounts of at least 100 Americans and caused the public release of this …

How the digital revolution is transforming the US federal government
The digital revolution is dominating and transforming the work of the US federal government, and those federal agencies that develop a people first approach will stand out in …

Mobile device infections rose 96 percent in the first half of 2016
After examining general trends and statistics for malware infections in devices connected through mobile and fixed networks, Nokia found a sharp rise in the occurrence of …

Best practices for using military grade security
Governments and militaries around the world have long recognised that their lines of communications were often their weakest links and required some of the strongest …

Vulnerabilities found in cars connected to smartphones
Many of today’s automobiles leave the factory with secret passengers: prototype software features that are disabled but that can be unlocked by clever drivers. In what …

Law enforcement equipment: Technology plays a complicated role
Law enforcement is challenged by the need for a balance between equipping officers with gear that will protect them while also trying to manage the appearance of acts of …

L0phtCrack 7 audits passwords up to 500 times faster
L0pht Holdings released a completely revamped L0phtCrack 7, which includes a new cracking engine which takes optimal advantage of multi-core CPUs and multi-core GPUs. A 4-core …

Ubiquity and danger: The web scraping economy
Web scraping is a technique of extracting information from web sites, and often includes transforming unstructured web site data into a database for analysis or repurposing …

Risk and the Pareto Principle: Applying the 80/20 rule to your risk management strategy
Enterprises these days are putting more resources into monitoring and managing business risk. And with good reason – in light of a growing number of vulnerabilities and …
Featured news
Resources
Don't miss
- April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft
- Forward-thinking CISOs are shining a light on shadow IT
- Inside the AI-driven threat landscape
- Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)