Help Net Security
![GCHQ](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195732/GCHQ-aerial-400x200.jpg)
GCHQ open sources Gaffer, a data collection and mining framework
GCHQ, the UK equivalent of the US National Security Agency (NSA), has released on Monday the source code of Gaffer, a graph database that optimised for “retrieving data …
![Trojan](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09100949/trojan_horse-400x200.jpg)
Operation targets users of remote access trojans across Europe
In December, Europol and a number of law enforcement and judicial authorities across Europe carried out a two weeks long coordinated action against the use of remote access …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195744/letters-691842_1280-400x200.jpg)
How to eliminate encryption silos
Working in the encryption business, you’ll quickly learn that there are a number of problems that organizations can run into while deploying the technology. The …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195808/Fotolia_87149221_S-400x200.jpg)
Are your competitors organizing DDoS attacks against you?
According to recent research from Kaspersky Lab and B2B International, nearly half (48 per cent) of the companies surveyed believe they know the identity and motivation of …
![Hadoop](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195805/twitter-article1-400x200.jpg)
Is Hadoop secure enough for the enterprise?
An ever-increasing number of organisations are turning to big data to gain valuable insight that can be immediately acted on to increase revenue, lower operating costs, or …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195815/dollar-943737_1280-400x200.jpg)
Cybercriminals increasingly hunting down the money
The tools used by cyber-criminals against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab’s review of corporate threats in …
Week in review: First ever EU rules on cybersecurity, insider threats, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: New Steam escrow system drives impatient users to fake trading sites serving malware …
Inside job: 6 ways employees pose an insider threat
CISOs and CIOs have seen the prospects of losing control over data and the accompanying data privacy and security concerns as the biggest hurdle to cloud adoption. According …
SQL injection has surfaced as the no. 1 attack in 2015
A new survey from Ponemon Institute finds that nearly 80 percent of enterprises say that their organization’s portfolio of applications has become more vulnerable to …
![Pirate flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195357/pirate-flag-400x200.jpg)
Malware threats on pirated content sites
Content theft sites pose a serious and growing threat to Internet users by exposing them to harmful malware that can lead to identity theft, financial loss and computers being …
![RSA Conference Innovation Sandbox 2015](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09194357/rsaconference-innovationsandbox2015-400x200.jpg)
RSA Conference opens Innovation Sandbox Contest
The RSA Conference annual Innovation Sandbox Contest is now accepting submissions to name the “RSAC Most Innovative Startup 2016.” Past winners include successful companies …
Six trends that will further the development of the Internet of Things
1. The death of the password is rapidly approaching. New and more serious data breaches among well known consumer brands will continue to erode faith in perimeter and …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage