Help Net Security

Growing security negligence in the workplace
A surprising disconnect exists between employees’ growing concern over the security of their personal information and their attitudes toward data security practices in …

Amazon selfie password: Is this the future?
Amazon’s “Selfie Authentication” allows the site’s customers to user facial recognition to authenticate themselves to the website in order to make a purchase. While not …

Lynis 2.2.0: New features, tests, and enhancements
Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …

Demand for advanced DDoS mitigation on the rise
The increasing popularity of DDoS attacks as a tool to disrupt, harass, terrorize and sabotage online businesses is boosting demand for mitigation solutions. In the face of …

Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in
Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in Here’s an overview of some of last …

Privacy by Design: What it is and where to build it
People tend to think about privacy in terms of the individual, but it is also critically important for the proper functioning of any business organization. This is being made …

Companies still lack adequate data privacy tools
93 percent of IT professionals agree that customer data privacy concerns are a critical issue at the C-level. Yet, only 9 percent percent believe current privacy and consent …

Insight into critical data remains limited
SANS surveyed 829 IT professionals with endpoints located around the globe to explore how IT professionals monitor, assess, protect and investigate their endpoints. A majority …

Security CLTRe Toolkit: Build and improve security culture
Norwegian security culture startup CLTRe has announced today at CeBIT its Security CLTRe Toolkit. The SaaS-based toolkit will provide organizations from SMEs to large …

Why the next wave of cybersecurity talent won’t have a ‘security’ job title
Over the past five years, we’ve witnessed the state of cybersecurity become chaotic – and, quite frankly, grim – across a variety of industries. Hotels, financial …

Security concerns over connected devices mask the greater threat
The popular and sometimes controversial Shodan search engine made some changes recently that drew attention mostly of the latter variety. If you are not familiar with Shodan, …

Google Hands Free entering the mobile payments game
Google has announced that it is testing its new payment app, Hands Free, which (as the name suggests) allows users to make payments without the need to use their hands, mobile …
Featured news
Resources
Don't miss
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery
- How healthcare CISOs can balance security and accessibility without compromising care
- Report: The State of Secrets Sprawl 2025
- APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)