Help Net Security
How businesses interpret and use threat intelligence
A new IDC study of 300 large UK companies found that: 96% of UK firms already use threat intelligence products and services; all of those surveyed intend to do so within the …
Week in review: Linux ransomware, university researchers unmask Tor users, and how one man changed the way we understand SSL
Here’s an overview of some of last week’s most interesting news and articles:Ivan Ristic and SSL Labs: How one man changed the way we understand SSL“When I …
The appliance straightjacket and its effect on security
We have a love/hate relationship with our IT appliances. These technology workhorses impress us with their modern, industrial designs, bright colors, and slick branding. When …
Video: General Data Protection Regulation, Safe Harbor Agreement, Copyright reform and the Google case
After having been ruled invalid by the ECJ, the Safe Habor Agreement is now back in the spotlight as the Commission has finally issued a communication on the Trans-Atlantic …
Data breaches and bots are driving cybercrime surge
From July to September, ThreatMetrix detected more than 90 million attempted attacks across industries, representing a 20 percent increase over the previous quarter. This …
Factors that influence breach costs
A variety of both positive and negative factors influence the expenses organizations incur as a result of breach, according to the SANS Institute. A lot of it depends on their …
The automation and industrialization of cyber attacks
A new Imperva report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive …
Why governments need to take the lead in cybersecurity
Time and time again we hear people lament about the impact cybercrime has on our businesses, our individual lives, the economy, and on society. Report after report show the …
Endpoint security lags in spite of vulnerabilities
Endpoint security solutions today continue to lag, failing to provide adequate protection or detection against today’s security threats, according to Promisec. Survey results …
Buhtrap gang distributes malware through Ammyy’s remote desktop software
ESET has uncovered several examples of malware being distributed via a strategic web compromise. Recently, visitors to ammyy.com were offered a bundle containing not only the …
Three indicted in largest theft of customer data from a U.S. financial institution in history
On Tuesday, federal prosecutors unsealed a superseding indictment charging Gery Shalon, Joshua Samuel Aaron and Ziv Orenstein with orchestrating massive computer hacking …
Long-term skills shortage drives tech salaries up
Four in 10 technologists changed jobs this year, according to the Harvey Nash Technology Survey. Respondents listed a good salary as their main motivator (77 percent) behind …