Help Net Security
91.1% of ICS hosts have vulnerabilities that can be exploited remotely
To minimize the possibility of a cyber attack, Industrial Control Systems (ICS) are supposed to be run in a physically isolated environment. However this is not always the …

Manage cybersecurity risk by restoring defense-in-depth’s promise
Cybersecurity spending continues to soar, as the current, $75.4 billion worldwide market will increase to $101 billion by 2018, according to projections from Gartner. But how …

What happens to consumer trust when a business is breached?
In this podcast recorded at Infosecurity Europe 2016, Bill Mann, Chief Product Officer at Centrify, talks about what happens to consumer trust when a business is breached. The …

Cyber espionage group uses low profile tools to hunt high profile targets
Kaspersky Lab researchers investigated a threat actor that was undertaking aggressive cyber espionage activity in the Asian region, targeting multiple diplomatic and …

UK: Cybercrime now bigger threat than traditional crime
The accelerating pace of technology and criminal cyber capability currently outpaces the UK’s collective response to cybercrime, calling for stronger collaborative working …

Week in review: Mac malware boom, TP-LINK loses control of configuration domains
Here’s an overview of some of last week’s most interesting news, reviews and articles: TP-LINK loses control of two device configuration domains Security …

Ransomware: Can we finally start learning from past mistakes?
There is a phrase I am finding quite relevant lately. It is attributed to the philosopher George Santayana and it goes like this: “Those who cannot remember the past are …

DDoS extortion campaigns increasingly target businesses
80 percent of European IT security professionals expect their business to be threatened with a DDoS ransom attack during the next 12 months, according to Corero Network …

Unsung cybersecurity vulnerabilities in US infrastructure and utilities
This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated “legacy systems” still in use …

Growth prospects of the cloud-based information governance market
The global cloud-based information governance market will grow at a CAGR of more than 27% through 2020, according to Technavio. Cloud-based information governance involves the …

Avast to acquire AVG for $1.3 billion
Avast Software and AVG Technologies have entered into a purchase agreement in which Avast will offer to purchase all of the outstanding ordinary shares of AVG for $25.00 per …

StubHub fraud ringleader sentenced to state prison
Vadim Polyakov was sentenced to 4-to-12 years in state prison for coordinating an international cybercrime and money laundering scheme that involved the theft of personal …