Help Net Security

What’s the real cost of a security breach?
The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 …

Network forensic analysis tool NetworkMiner 2.0 released
NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any …

Most IT pros have seen potentially embarrassing information about their colleagues
More than three-quarters of IT professionals have seen and kept secret potentially embarrassing information about their colleagues, according to new research conducted by …

The return of Carbanak: Banks face new attacks
A year after Kaspersky Lab warned that cyber-criminals would start to adopt the tools and tactics of nation-state backed APTs in order to rob banks, the company has confirmed …

Sensitive data stolen in Gyft data breach
Gyft, a digital gift card platform that enables you to buy, send, and manage gift cards from hundreds of retailers, is notifying users who may have been affected by a security …

Week in review: EU-US Privacy Shield, using AI to build an army of virtual analysts
Here’s an overview of some of last week’s most interesting news and articles: Fake Amazon survey-for-money offer leads to account compromise “As a valued …

Cloud Security Alliance hackathon offers $10,000 prize
The Cloud Security Alliance (CSA) will hold its fourth hackathon at the RSA Conference 2016 in San Francisco, to continue to test the CSA Software Defined Perimeter (SDP) …

Modern IRM: Securing the future of work
No matter what business you’re in, the one thing you produce more than anything else is text. Every day, you and your colleagues are creating, discussing, and documenting …

EU-US Privacy Shield: New framework for transatlantic data flows
The European Commission and the United States have agreed on a new framework for transatlantic data flows: the EU-US Privacy Shield. The College of Commissioners approved the …

Severe and unpatched eBay vulnerability allows attackers to distribute malware
Check Point researchers have discovered a severe vulnerability in eBay’s online sales platform, which allows criminals to distribute malware and run phishing campaigns. …

Security and privacy issues plague wearable fitness tracking devices
A new report is describing major security and privacy issues in several leading wearable fitness tracking devices and accompanying mobile applications. The research examined …

Your board and cyber risk: Reimagining security protocols from the top down
As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse